0x4d5a-ctf / 38c3_com_talkLinks
Slides for COM Hijacking AV/EDR Talk on 38c3
☆74Updated 8 months ago
Alternatives and similar repositories for 38c3_com_talk
Users that are interested in 38c3_com_talk are comparing it to the libraries listed below
Sorting:
- shell code example☆62Updated 3 months ago
- ☆61Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆94Updated 7 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆90Updated 3 weeks ago
- ☆93Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated 10 months ago
- ☆50Updated 5 months ago
- ForsHops☆58Updated 5 months ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆20Updated last year
- ☆100Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 6 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Plantronics Desktop Hub LPE☆36Updated last year
- Rust template/library for implementing your own COFF loader☆69Updated 7 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆45Updated 8 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆120Updated 9 months ago
- load shellcode without P/D Invoke and VirtualProtect call.☆115Updated last week
- A few examples of how to trap virtual memory access on Windows.☆34Updated 8 months ago
- ☆78Updated 7 months ago
- Linker for Beacon Object Files☆128Updated this week
- A synergized Visual Studio and Rust development environment☆19Updated 7 months ago
- "Service-less" driver loading☆161Updated 9 months ago
- A collection of position independent coding resources☆93Updated this week
- ☆31Updated 9 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 7 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆99Updated 6 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 3 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year