securycore / Ikeext-PrivescLinks
Windows IKEEXT DLL Hijacking Exploit Tool
☆33Updated 7 years ago
Alternatives and similar repositories for Ikeext-Privesc
Users that are interested in Ikeext-Privesc are comparing it to the libraries listed below
Sorting:
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 3 years ago
- Some random tools I use for penetration testing☆88Updated last month
- Simple APPLocker bypass summary☆42Updated 6 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 2 years ago
- python spraying tools based on impacket lib☆53Updated 2 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆80Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago
- Loads a custom dll in system32 via diaghub.☆76Updated 5 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆57Updated 5 years ago
- (kinda) Malicious Outlook Reader☆135Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 3 years ago
- ☆29Updated 2 years ago
- ☆45Updated 8 years ago
- ☆92Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- ☆125Updated 2 years ago
- C# tool to discover low hanging fruits☆95Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆55Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- ☆139Updated last year
- Windows Privilege Escalation☆62Updated 2 years ago
- ACL abuse swiss-knife☆123Updated 2 years ago