yanghaoi / 360SecuritySandboxEscape
Proofs-Of-360Security Sandbox Escape
☆10Updated 3 years ago
Alternatives and similar repositories for 360SecuritySandboxEscape:
Users that are interested in 360SecuritySandboxEscape are comparing it to the libraries listed below
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year
- DLL Unhooking☆12Updated 4 years ago
- ☆9Updated last year
- Load ssp dll golang implementation☆19Updated 3 years ago
- unhook etw by golang☆10Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- desktop screenshot☆29Updated 2 years ago
- A flexible tool that creates a minidump of the LSASS process☆13Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- Hide Port In Windows☆38Updated 6 months ago
- works but not work, cao!☆24Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- automatic privilege escalation by pspy☆22Updated 3 years ago
- ☆19Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- ☆11Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 2 years ago