0x4d5a-ctf / 38c3_com_talkLinks
Slides for COM Hijacking AV/EDR Talk on 38c3
☆74Updated last year
Alternatives and similar repositories for 38c3_com_talk
Users that are interested in 38c3_com_talk are comparing it to the libraries listed below
Sorting:
- This repo contains PoCs for vulnerable Windows drivers.☆114Updated last month
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆116Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated last year
- ☆100Updated last year
- ☆64Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 5 months ago
- shell code example☆67Updated last month
- Linker for Beacon Object Files☆146Updated last week
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆21Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- ForsHops☆59Updated 10 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 5 months ago
- A collection of position independent coding resources☆106Updated 2 months ago
- ☆52Updated 10 months ago
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated 2 months ago
- Windows AppLocker Driver (appid.sys) LPE☆72Updated last year
- ☆57Updated 6 months ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Updated 4 months ago
- ☆100Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Updated 10 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 9 months ago
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated last year
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 11 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 7 months ago
- "Service-less" driver loading☆166Updated last year