Joel GM's starred repositories
CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
Invoke-SessionHunter
Retrieve and display information about active user sessions on remote computers. No admin privileges required.
Invisi-Shell
Hide your Powershell script in plain sight. Bypass all Powershell security features
DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
nopowershell
PowerShell rebuilt in C# for Red Teaming purposes
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
go-secdump
Tool to remotely dump secrets from the Windows registry
elevationstation
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
BlackLotus
BlackLotus UEFI Windows Bootkit
FullPowers
Recover the default privilege set of a LOCAL/NETWORK SERVICE account
HiddenDesktop
HVNC for Cobalt Strike
yetAnotherObfuscator
C# obfuscator that bypass windows defender
LTESniffer
An Open-source LTE Downlink/Uplink Eavesdropper
LOLDrivers
Living Off The Land Drivers