KillDefender_BOF
Privilege escalation tool
A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service
Beacon Object File implementation of pwn1sher's KillDefender
62 stars
5 watching
15 forks
Language: C++
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| Tool to bypass Windows security restrictions and gain elevated privileges | 148 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| A tool to add exclusions to a security system's defender to prevent false positives or unwanted alerts | 32 |
| A tool to add or remove specific privilege rights from the token of the current process | 52 |
| Tools to determine Windows Defender exclusions | 241 |
| An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 |
| A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
| A tool that bypasses UAC restrictions on Windows by deserializing and executing malicious code in Event Viewer. | 129 |
| A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
| A PowerShell module for demonstrating third-party privilege escalation attacks with Cobalt Strike's Beacon payload | 894 |
| Represents a proof-of-concept for exploiting a vulnerability to gain privileged access on Windows 10 systems | 79 |
| A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,060 |
| Exploits a vulnerability in the polkit system to gain elevated privileges | 1,973 |
| A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |