Make an executable run with TrustedInstaller permissions under SYSTEM account.
☆46Nov 16, 2020Updated 5 years ago
Alternatives and similar repositories for GetTrustedInstaller
Users that are interested in GetTrustedInstaller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆244Oct 14, 2024Updated last year
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 5 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Feb 26, 2022Updated 4 years ago
- CVE-2022-24734 PoC☆48May 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 4 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- ☆15Aug 1, 2023Updated 2 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆107Feb 14, 2023Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.☆58Mar 8, 2022Updated 4 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- Resolve offsets, gadgets and symbols from NTKernel☆61Jan 15, 2026Updated 3 months ago
- UAC bypass for x64 Windows 7 - 11☆840Feb 2, 2026Updated 3 months ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆18Feb 2, 2023Updated 3 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- Read my blog for more info -☆30Apr 27, 2021Updated 5 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Mar 25, 2024Updated 2 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- ☆11Mar 28, 2021Updated 5 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Adversary Simulation Framework☆40Aug 19, 2025Updated 8 months ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 3 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- Breaking fastjson with forward shell☆23Sep 1, 2022Updated 3 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- ☆23May 23, 2024Updated last year
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago