rthxr / Win32Api-Abusing-Tokens
Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API
☆9Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for Win32Api-Abusing-Tokens
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- ☆43Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- 😛 Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)☆19Updated last year
- ☆13Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆25Updated last month
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 8 months ago
- Colored Cat is a syntax highlighter file reader.☆16Updated 5 months ago
- Make an Linux Kernel rootkit visible again.☆45Updated 2 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆14Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 10 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 3 months ago
- ☆37Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆16Updated 3 weeks ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- C++ SSL REVERSE SHELL☆20Updated this week
- 「🧊」Ring 3 Rootkit for Windows 10☆55Updated 8 months ago
- ☆46Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆42Updated last year
- ☆37Updated last week
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆29Updated 2 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆21Updated 5 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- Some Useful Tricks for Pentest Android and iOS Apps☆62Updated 3 weeks ago