EddieIvan01 / win32api-practiceLinks
Offensive tools written for practice purposes
☆159Updated 2 years ago
Alternatives and similar repositories for win32api-practice
Users that are interested in win32api-practice are comparing it to the libraries listed below
Sorting:
- Beacon.dll reverse☆140Updated 3 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆188Updated 3 years ago
- ☆91Updated 3 years ago
- Misc TaskScheduler Plays☆233Updated 2 years ago
- ReflectiveDLL☆157Updated 5 years ago
- It stinks☆102Updated 3 years ago
- Another shellcode runner 🦀 🐚☆148Updated 3 years ago
- Beacon compiled using clang☆69Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆65Updated last year
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆72Updated last year
- An implementation of an indirect system call☆127Updated last year
- 破解CS4.0☆162Updated 5 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- Convert PE files to a shellcode☆76Updated 5 years ago
- ☆89Updated 2 years ago
- ☆49Updated 3 years ago
- bypass uac☆143Updated 6 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated 11 months ago
- ☆32Updated 4 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆217Updated 2 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- ☆74Updated 3 years ago
- ☆81Updated 3 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- shellcode生成框架☆86Updated 10 months ago