KnicKnic / native-powershell
A C DLL that can control powershell
☆45Updated 5 years ago
Alternatives and similar repositories for native-powershell:
Users that are interested in native-powershell are comparing it to the libraries listed below
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Example of building an application verifer DLL☆46Updated 10 months ago
- A C# implementation of dumping credentials from Windows Credential Manager☆57Updated last year
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆38Updated last year
- Windows Detour Hooking in PowerShell☆78Updated 10 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆45Updated 8 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆71Updated this week
- ☆81Updated 7 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Youtube channel sample code☆49Updated last week
- a tiny program to consume from ETW providers for research☆47Updated 3 months ago
- Research into WinSxS binaries and finding hijackable paths☆28Updated this week
- ☆45Updated last year
- This project will guide yout to awareness of injection in almost every window API and process.☆25Updated 3 years ago
- ☆39Updated 2 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆12Updated last week
- ☆82Updated 7 months ago
- In-memory hiding technique☆48Updated 3 months ago
- List the ETW provider(s) in the registration table of a process.☆58Updated last year
- ☆12Updated 9 months ago
- ☆104Updated 5 months ago
- Reflective DLL self-loading as a library☆19Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆11Updated 4 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 9 months ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Offensive tool for fileless lateral movement on Windows networks☆25Updated 11 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆9Updated 2 years ago
- ☆28Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year