timwhitez / killProcessPOC
use aswArPot.sys to kill process
☆64Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for killProcessPOC
- A wrapper of ldap_shell.py module which in ntlmrelayx☆60Updated 2 years ago
- Load shellcode via syscall☆47Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆41Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆31Updated 2 years ago
- ShellCodeLoader via DInvoke☆49Updated 3 years ago
- ☆38Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆65Updated 2 years ago
- Beacon compiled using clang☆59Updated last year
- more conveniently Visual-Studio-BOF-template☆53Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆62Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- cmd2shellcode☆78Updated 3 years ago
- ReturnGate, just like HellsGate.☆65Updated 2 years ago
- Bypass EDR Create TaskServers☆34Updated last year
- desktop screenshot☆29Updated last year
- dump lsass tool☆39Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆32Updated 3 years ago
- ☆30Updated 4 years ago
- ☆72Updated 3 years ago
- A simple hidden vnc.☆32Updated 3 years ago
- ☆89Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- Fork & modify of Wireguard's Memmod☆31Updated last year
- Imitate CobaltStrike's Shellcode Generation☆3Updated 2 years ago
- Evasive loader to bypass static detection☆54Updated 10 months ago
- ☆30Updated last year
- Using fibers to execute shellcode in a local process via csharp☆28Updated 2 years ago