0x4d5a-ctf / 38c3_com_talkLinks
Slides for COM Hijacking AV/EDR Talk on 38c3
☆74Updated 11 months ago
Alternatives and similar repositories for 38c3_com_talk
Users that are interested in 38c3_com_talk are comparing it to the libraries listed below
Sorting:
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆113Updated 10 months ago
- ☆97Updated last year
- ☆62Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- shell code example☆63Updated last month
- ForsHops☆59Updated 8 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆131Updated 3 months ago
- ☆51Updated 8 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆104Updated 3 months ago
- ☆100Updated 2 years ago
- Linker for Beacon Object Files☆132Updated last week
- ☆31Updated last year
- "Service-less" driver loading☆163Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 6 months ago
- Plantronics Desktop Hub LPE☆37Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 10 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 10 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- A collection of position independent coding resources☆100Updated 3 weeks ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆31Updated 6 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆121Updated 11 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 8 months ago
- Windows AppLocker Driver (appid.sys) LPE☆67Updated last year
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆112Updated 2 weeks ago
- A synergized Visual Studio and Rust development environment☆19Updated 10 months ago
- A collection of PoCs to do common things in unconventional ways☆119Updated 3 months ago