Ap3x / WALKWHISPER
Windows API header file parsing tool to generate source code for Windows API hashing
☆4Updated last year
Alternatives and similar repositories for WALKWHISPER:
Users that are interested in WALKWHISPER are comparing it to the libraries listed below
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆60Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ☆58Updated last year
- ☆47Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆17Updated 7 months ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Python module for running BOFs☆70Updated last year
- Living Off the Foreign Land setup scripts☆65Updated 2 weeks ago
- ☆48Updated 4 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 2 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 weeks ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 8 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆73Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- ☆69Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- This repo contains a PoC of exploiting Worst Fit (props to Orange Tsai and Splitline who presented this research at Black Hat EMEA 2024)☆10Updated 2 months ago
- a tiny program to consume from ETW providers for research☆46Updated 2 months ago