rthxr / Win32Api-Abusing-TokensLinks
Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API
☆8Updated last year
Alternatives and similar repositories for Win32Api-Abusing-Tokens
Users that are interested in Win32Api-Abusing-Tokens are comparing it to the libraries listed below
Sorting:
- ☆45Updated 2 years ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Colored Cat is a syntax highlighter file reader.☆16Updated last year
- burp extension for brazilian stuff☆27Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- ☆70Updated 3 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆25Updated 2 months ago
- ☆38Updated 2 years ago
- ☆16Updated 8 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 10 months ago
- ☆47Updated 3 years ago
- ☆57Updated 7 months ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 6 months ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 6 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 6 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- Encodes a payload within a generated mock-CSS file☆58Updated last year