sailay1996 / SECOMN_EoPView external linksLinks
Sound Research SECOMN service Privilege Escalation (windows 10)
☆39Mar 17, 2020Updated 5 years ago
Alternatives and similar repositories for SECOMN_EoP
Users that are interested in SECOMN_EoP are comparing it to the libraries listed below
Sorting:
- Python api for usage with cobalt strike's External C2 specification☆63Nov 6, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 5 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 5 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Credential Dumper☆79Feb 19, 2020Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Project to use Golang inside C#☆80Jun 5, 2020Updated 5 years ago
- A small .NET compression utility☆57Feb 2, 2022Updated 4 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Nov 7, 2020Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Stop Windows Defender programmatically☆15Jan 17, 2022Updated 4 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- cve-2020-0688☆166Feb 26, 2020Updated 5 years ago
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142May 23, 2020Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Aug 13, 2020Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Oct 2, 2020Updated 5 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago