C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
☆17Sep 8, 2021Updated 4 years ago
Alternatives and similar repositories for ImpulsiveDLLHijack
Users that are interested in ImpulsiveDLLHijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Save a screenshot of the Windows desktop from command line (C API)☆10Aug 30, 2016Updated 9 years ago
- Go package for fexecve(3) and execveat(2)☆15Mar 4, 2026Updated 2 weeks ago
- A decentralized basic Trojan framework that eliminates C2 mode and is implemented by P2P, the core networking technology of blockchain☆48Apr 7, 2024Updated last year
- Post-exploitation script developed using impacket☆21Mar 15, 2022Updated 4 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- ScareCrow loader binary source which easier to read and learn☆25Apr 14, 2022Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Dec 13, 2021Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆45Mar 9, 2022Updated 4 years ago