sec-consult / msiscan
Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers
☆112Updated 4 months ago
Alternatives and similar repositories for msiscan:
Users that are interested in msiscan are comparing it to the libraries listed below
- ☆83Updated 2 years ago
- ☆106Updated 2 months ago
- Local & remote Windows DLL Proxying☆161Updated 7 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- ☆113Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Find DLLs with RWX section☆76Updated last year
- Find .net assemblies locally☆104Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 8 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆115Updated 8 months ago
- Create Anti-Copy DRM Malware☆51Updated 5 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated last month
- ☆89Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆88Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- .NET deserialization hunter☆76Updated 6 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆84Updated 11 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆103Updated 9 months ago
- ☆70Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆118Updated 2 years ago
- Source code and examples for PassiveAggression☆54Updated 7 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 6 months ago
- To audit the security of read-only domain controllers☆114Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆173Updated 10 months ago