Windows IKEEXT DLL Hijacking Exploit Tool
☆35Feb 25, 2018Updated 8 years ago
Alternatives and similar repositories for Ikeext-Privesc
Users that are interested in Ikeext-Privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- This is my personal blog where I talk about science and technology, especially about offensive cybersecurity.☆12Dec 28, 2025Updated 3 months ago
- mGB - Nintendo Gameboy MIDI control for Arduinoboy☆14Jan 18, 2021Updated 5 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Mannu Shell is PHP web based shell. This code is meant for performing server side file manipulation and other stuffs. Its backdoor free a…☆17Jun 27, 2018Updated 7 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 6 years ago
- Assorted writings☆14Jul 20, 2021Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- User-Defined C2 BOF Template☆31Nov 24, 2025Updated 4 months ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fix all annoyances on Samsung devices. It lets you Disable max volume warning, Disable max brightness warning, Choose animation scale fro…☆13Feb 14, 2020Updated 6 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆13May 12, 2025Updated 10 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- ☆12Oct 2, 2022Updated 3 years ago
- Homepage of the ClearURLs WebExtension.☆13Feb 5, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- [DEPRECATED] Please see https://github.com/Clemeit/ddo-audit-ui for the new repo.☆13Jul 22, 2025Updated 8 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Juicy Potato for x86 Windows☆132Oct 12, 2019Updated 6 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated last year
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- ☆16Sep 26, 2021Updated 4 years ago
- PHP文件上传漏洞☆11Jun 11, 2018Updated 7 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year