riskydissonance / Ridgway
A quick tool for hiding a new process running shellcode.
☆56Updated 4 years ago
Alternatives and similar repositories for Ridgway:
Users that are interested in Ridgway are comparing it to the libraries listed below
- ☆36Updated 4 years ago
- Files for http://deniable.org/windows/windows-callbacks☆23Updated 4 years ago
- ☆50Updated 5 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago
- ☆35Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆29Updated 4 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Updated 5 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- gui uac bypass (netplwiz.exe)☆64Updated 5 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 5 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 6 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- CVE-2019-1040 with Kerberos delegation☆32Updated 3 years ago
- ☆36Updated 5 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 4 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Updated 4 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 4 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆26Updated 5 years ago