There are no reviews yet. Be the first to send feedback to the community and the maintainers!
RasmanPotato
Abuse Impersonate Privilege from Service to SYSTEM like other potatoes doBypassUserAdd
通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化Shellcode_Memory_Loader
基于Golang实现的Shellcode内存加载器,共实现3中内存加载shellcode方式,UUID加载,MAC加载和IPv4加载,目前能过主流杀软(包括Windows Defender)PetitPotam
替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, a series of local rights escalation methods have been realizedPrintSpoofer
PrintSpoofer的反射dll实现,结合Cobalt Strike使用net_memory_webshell
用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改magicNetdefs
Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitationExtracted_WD_VDM
Windows Defender VDM lua collectionsgoHashDumper
用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现magicDiagTrack
DiagTrack Eop (From Service Account to SYSTEM)magicAzureAttestService
针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复sucksAV
This project used to learn golang and try to bypass AVLaravel_CVE-2021-3129_EXP
ProcessPlayer
一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉listTokeninfoByPipe
用于列出基于管道模拟RPC客户端获得令牌时的令牌详细信息和通过转化为主令牌从而执行创建进程等相关操作crisprss
wikicrawl
csdn_crawl
token_vault
Used to be familiar with and understand the related mechanism of Token in Windowszhipinspider
CVEs
List for some of my cvesProcessMonitor
ProcessMonitorLove Open Source and this site? Check out how you can help us