RID-Hijacking

RID Hijack

A Windows persistence technique using PowerShell to maintain access by hijacking the RID (Role Identity) of an existing account.

Windows RID Hijacking persistence technique

GitHub

165 stars
12 watching
43 forks
Language: PowerShell
last commit: about 2 years ago

Related projects:

Repository Description Stars
joeavanzato/trawler A PowerShell script designed to help Incident Responders discover potential indicators of compromise on Windows hosts by scanning for various persistence techniques. 308
dragokas/hijackthis Scans for and identifies malicious system modifications 699
redsection/offensiveph A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes 329
d4rk007/redghost A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems 536
d4stiny/spectre A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. 685
theflakes/reg_hunter A tool for triaging and hunting Windows persistence mechanisms, providing forensic insights into system activity. 142
3v4si0n/http-revshell A tool providing a reverse shell connection through HTTP/S protocol with evasion techniques 595
c3r3br4t3/shadowrdp Tools to exploit remote desktop sessions using NTLM and Kerberos authentication 61
nivekuil/rip A safer alternative to rm with features like file backup and undo functionality 1,440
alanrenouf/windows-workstation-and-server-audit A PowerShell script that audits Windows Workstations or Servers to ensure security and compliance. 89
hasherezade/persistence_demos Demonstrates various persistence methods used by malware 219
mssabr01/sixnet-tools A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access 16
p0w3rsh3ll/autoruns Provides tools to detect and enumerate autorun entries and their associated files on Windows systems. 256
c0r0n3r/dheater An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service 186
evild3ad/memprocfs-analyzer Automated forensic analysis tool for Windows memory dumps 540