Stars
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- Boo
- Bro
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- LLVM
- Lua
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- ReScript
- Ruby
- Rust
- SCSS
- Shell
- Swift
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
SECFORCE / SharpAllowedToAct
Forked from pkb1s/SharpAllowedToActComputer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)
Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections allocated by the CLR.
This repository has been moved to https://github.com/kirides/go-d3d
It's a minifilter used for transparent-encrypting.
Nidhogg is an all-in-one simple to use windows kernel rootkit.
Phantom DLL Hollowing method implemented in modmap
Monitoring and controlling kernel API calls with stealth hook using EPT
A tool for converting SysWhispers3 syscalls for use with Nim projects
A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Call NtCreateUserProcess directly as normal.
PowerShell MachineAccountQuota and DNS exploit tools
Some Code Samples for Windows based Inter-Process-Communication (IPC)
PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)