KnicKnic / native-powershellLinks
A C DLL that can control powershell
☆51Updated 6 years ago
Alternatives and similar repositories for native-powershell
Users that are interested in native-powershell are comparing it to the libraries listed below
Sorting:
- A Patchless AMSI Bypass Technique using VEH²☆30Updated 6 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆50Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Updated 10 years ago
- Playing with packets in C#☆15Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆60Updated 2 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆99Updated 3 years ago
- Reflective DLL self-loading as a library☆21Updated 8 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated last year
- ☆83Updated last year
- ☆102Updated last year
- Example of building an application verifer DLL☆50Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Updated 9 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Updated 2 years ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆93Updated 3 weeks ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Updated 9 months ago
- ☆106Updated last year
- Load and execute a common object file format (COFF) in the current process☆32Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆80Updated 6 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆80Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆36Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- ☆39Updated 3 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆75Updated last year
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- Tool for playing with Windows Access Token manipulation.☆82Updated 3 years ago