3gstudent / Catch-specified-file-s-handle
Enumerate all processes and get specified file's handle,then close it.
☆11Updated 6 years ago
Alternatives and similar repositories for Catch-specified-file-s-handle:
Users that are interested in Catch-specified-file-s-handle are comparing it to the libraries listed below
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Updated 6 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- KernelBugTest☆15Updated 6 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- ☆11Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- ☆54Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 9 years ago
- DNS反弹shell客户端☆12Updated 8 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- Introduce you to shellcode development.☆23Updated 8 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- ☆17Updated 5 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- ACTIVELabs Security Advisories☆21Updated 3 years ago
- 新的注入方式☆11Updated 6 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆30Updated 5 years ago