EddieIvan01 / win32api-practiceLinks
Offensive tools written for practice purposes
☆160Updated 2 years ago
Alternatives and similar repositories for win32api-practice
Users that are interested in win32api-practice are comparing it to the libraries listed below
Sorting:
- Beacon.dll reverse☆140Updated 3 years ago
- ☆91Updated 4 years ago
- Beacon compiled using clang☆70Updated 2 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆190Updated 3 years ago
- Misc TaskScheduler Plays☆236Updated 2 years ago
- ReflectiveDLL☆157Updated 5 years ago
- ☆49Updated 3 years ago
- Another shellcode runner 🦀 🐚☆149Updated 3 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- ☆89Updated 3 years ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆66Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆53Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- An implementation of an indirect system call☆129Updated last year
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- UAC_wenpon☆49Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- ☆32Updated 5 years ago
- bypass UAC even when configured to always notify user☆30Updated 3 years ago
- Windows Defender VDM lua collections☆47Updated 2 years ago
- ☆74Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 4 years ago
- 记录一下我学习的Win32CPP☆55Updated 3 years ago
- Load shellcode via syscall☆54Updated 3 years ago
- 基于Tinynuke修复得到的HVNC☆166Updated 3 years ago