AnastasiKro / ALPCheckerLinks
ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction
☆13Updated 3 years ago
Alternatives and similar repositories for ALPChecker
Users that are interested in ALPChecker are comparing it to the libraries listed below
Sorting:
- A utility that can be used to launch an executable with a DLL injected☆19Updated 2 years ago
- ☆18Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆35Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- EvtPsst☆55Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- ☆17Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆17Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆53Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- ☆63Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Updated last year