Popular repositories
-
New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
-
Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object.
33 contributions in the last year
Less
More

