H0K5 / Win10PostExploits
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Win10PostExploits
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- ☆11Updated 5 years ago
- ☆7Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 4 years ago
- ☆45Updated 6 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆27Updated 7 years ago
- ☆12Updated 8 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆17Updated 4 years ago
- Kernel mode windows NT API logger☆21Updated 5 years ago
- ☆13Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- ☆10Updated 4 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- ☆13Updated 6 years ago
- ☆22Updated 4 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago