Windows IKEEXT DLL Hijacking Exploit Tool
☆35Feb 25, 2018Updated 8 years ago
Alternatives and similar repositories for Ikeext-Privesc
Users that are interested in Ikeext-Privesc are comparing it to the libraries listed below
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- A project to maintain the list of CrowdStrike Falcon IP addressing for use in dynamic objects/lists on firewalls☆23Dec 8, 2021Updated 4 years ago
- Mannu Shell is PHP web based shell. This code is meant for performing server side file manipulation and other stuffs. Its backdoor free a…☆17Jun 27, 2018Updated 7 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- ☆10Mar 8, 2021Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 6 years ago
- User-Defined C2 BOF Template☆30Nov 24, 2025Updated 3 months ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- Fix all annoyances on Samsung devices. It lets you Disable max volume warning, Disable max brightness warning, Choose animation scale fro…☆13Feb 14, 2020Updated 6 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- CLI tool to download videos from redgifs.com☆12Sep 9, 2022Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- ☆12Oct 2, 2022Updated 3 years ago
- An open source tool designed for spying, information gathering, social engineering and reverse engineering Discord clients/bots☆16Oct 14, 2018Updated 7 years ago
- Homepage of the ClearURLs WebExtension.☆13Feb 5, 2025Updated last year
- TES5Edit documentation - by EpFwip☆14Aug 10, 2025Updated 7 months ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆47Apr 10, 2020Updated 5 years ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 9 months ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- CameraDar hacks its way into RTSP CCTV cameras.☆11Oct 27, 2017Updated 8 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- An HTTP Reverse Shell in Python☆84Aug 9, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago