CyberSecurityUP / SyscallHookDetectorLinks
☆17Updated 10 months ago
Alternatives and similar repositories for SyscallHookDetector
Users that are interested in SyscallHookDetector are comparing it to the libraries listed below
Sorting:
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last month
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- Windows internals and exploitation tricks☆105Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated 11 months ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- .NET tool used to enrich RPC telemetry☆96Updated 2 months ago
- ☆59Updated last year
- A repo to house files for our blogposts on blog.nviso.eu☆73Updated 5 months ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ☆74Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 2 years ago
- IAT Unhooking proof-of-concept☆30Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- ☆27Updated 2 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆60Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year