RID-Hijacking
Privilege Hijacking
A Windows persistence technique using PowerShell to hijack user privileges by modifying security attributes of an existing account.
Windows RID Hijacking persistence technique
166 stars
12 watching
43 forks
Language: PowerShell
last commit: 3 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| A PowerShell script designed to help Incident Responders discover potential indicators of compromise on Windows hosts by scanning for various persistence techniques. | 310 |
| Scans for and identifies malicious system modifications | 704 |
| A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes | 329 |
| A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 543 |
| A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. | 685 |
| A tool for triaging and hunting Windows persistence mechanisms, providing forensic insights into system activity. | 143 |
| A tool providing a reverse shell connection through HTTP/S protocol with evasion techniques | 599 |
| Tools to exploit remote desktop sessions using NTLM and Kerberos authentication | 62 |
| A safer alternative to rm with features like file backup and undo functionality | 1,453 |
| A PowerShell script that audits Windows Workstations or Servers to ensure security and compliance. | 89 |
| Demonstrates various persistence methods used by malware | 219 |
| A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 |
| Provides tools to detect and enumerate autorun entries and their associated files on Windows systems. | 258 |
| An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 187 |
| Automated tool for forensic analysis of Windows memory dumps | 555 |