0xcpu / winsmsd
Windows (ShadowMove) Socket Duplication
☆78Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for winsmsd
- ☆49Updated 4 years ago
- ☆67Updated last year
- A simple COM server which provides a component to run shellcode☆132Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆74Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 5 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆32Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆50Updated 4 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- ☆82Updated 2 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆103Updated 3 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆38Updated 3 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆38Updated last year
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆99Updated 5 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆50Updated 3 years ago
- C++ function that will automagically unhook a specified Windows API☆60Updated 4 years ago
- ☆31Updated 4 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- ☆58Updated 2 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- inject or convert shellcode to PE☆37Updated 5 years ago
- ☆79Updated 2 years ago