rootm0s / WinPwnageLinks
UAC bypass, Elevate, Persistence methods
☆2,689Updated 2 years ago
Alternatives and similar repositories for WinPwnage
Users that are interested in WinPwnage are comparing it to the libraries listed below
Sorting:
- Identifies the bytes that Microsoft Defender flags on.☆2,466Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,549Updated 8 months ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,877Updated 4 years ago
- AntiVirus Evasion Tool☆1,710Updated 2 months ago
- Defeating Windows User Account Control☆6,839Updated this week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,040Updated 8 months ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,383Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- PowerShell Obfuscator☆4,009Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,078Updated 2 years ago
- Mimikatz implementation in pure Python☆3,059Updated 3 weeks ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,373Updated 4 years ago
- Undetectable Windows Payload Generation☆1,599Updated 2 years ago
- Windows Event Log Killer☆1,789Updated last year
- Run PowerShell with rundll32. Bypass software restrictions.☆1,801Updated 4 years ago
- MS17-010☆2,192Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,508Updated 7 months ago
- Windows Exploit Suggester - Next Generation☆4,492Updated this week
- Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute☆2,179Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,266Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,179Updated last year
- Miscellaneous exploit code☆1,556Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,627Updated 2 years ago
- PowerShell ReverseTCP Shell - Framework☆1,056Updated 2 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,954Updated this week
- Stealing Signatures and Making One Invalid Signature at a Time☆2,249Updated 3 years ago
- Proof of concept for CVE-2019-0708☆1,183Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,641Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,730Updated 10 months ago