rthxr / Win32Api-Abusing-Tokens
Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API
☆9Updated 6 months ago
Related projects: ⓘ
- ☆43Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆89Updated 11 months ago
- 😛 Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)☆19Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated last month
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- ☆14Updated 11 months ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆12Updated last year
- Colored Cat is a syntax highlighter file reader.☆16Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- burp extension for brazilian stuff☆24Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆53Updated 6 months ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆14Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- A repository with my code snippets for research/education purposes.☆51Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 9 months ago
- ☆46Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆13Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆37Updated this week
- 「🚪」Linux Backdoor based on ICMP protocol☆55Updated 6 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 6 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- ☆82Updated 2 years ago
- ☆24Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆13Updated last year
- A collection of PoCs for different injection techniques on Windows!☆41Updated last year
- Make an Linux Kernel rootkit visible again.☆25Updated this week
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆40Updated 4 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆20Updated 2 months ago