AnastasiKro / ALPCheckerLinks
ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction
☆13Updated 2 years ago
Alternatives and similar repositories for ALPChecker
Users that are interested in ALPChecker are comparing it to the libraries listed below
Sorting:
- A utility that can be used to launch an executable with a DLL injected☆19Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- ☆18Updated 10 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A C# Tool to gather information about email breaches☆15Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 5 months ago
- EvtPsst☆55Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated last week
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- ☆34Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Updated last year
- ☆27Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ☆60Updated last year
- Modify managed functions from unmanaged code☆53Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆17Updated 6 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago