Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions
☆14Nov 13, 2022Updated 3 years ago
Alternatives and similar repositories for malicious-service
Users that are interested in malicious-service are comparing it to the libraries listed below
Sorting:
- ☆19Nov 28, 2024Updated last year
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。☆13Sep 25, 2020Updated 5 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 3 years ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- D/Invoke standalone shellcode runners☆39Nov 23, 2023Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- One WSL BOF to rule them all☆157Jan 14, 2026Updated last month
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- ☆79Sep 8, 2025Updated 5 months ago
- ☆27Jan 9, 2023Updated 3 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆29May 29, 2024Updated last year
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Jul 29, 2021Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 3 months ago
- ☆199Aug 28, 2025Updated 6 months ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- ☆31Jul 27, 2020Updated 5 years ago