0x4d5a-ctf / 38c3_com_talkLinks
Slides for COM Hijacking AV/EDR Talk on 38c3
☆74Updated last year
Alternatives and similar repositories for 38c3_com_talk
Users that are interested in 38c3_com_talk are comparing it to the libraries listed below
Sorting:
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆114Updated 11 months ago
- ☆64Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated last year
- ☆98Updated last year
- shell code example☆67Updated 3 weeks ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆135Updated 4 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 11 months ago
- ☆100Updated 2 years ago
- ☆31Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- "Service-less" driver loading☆167Updated last year
- ☆52Updated 9 months ago
- A synergized Visual Studio and Rust development environment☆19Updated 11 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 11 months ago
- ForsHops☆59Updated 9 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆52Updated 7 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Linker for Beacon Object Files☆145Updated 2 weeks ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆21Updated last year
- A collection of position independent coding resources☆105Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 10 months ago
- Rust template/library for implementing your own COFF loader☆72Updated 11 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 10 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 4 months ago
- Linux Process Injection via Seccomp Notifier☆79Updated last month
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆123Updated last year
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆32Updated 7 months ago