KnicKnic / native-powershellLinks
A C DLL that can control powershell
☆48Updated 5 years ago
Alternatives and similar repositories for native-powershell
Users that are interested in native-powershell are comparing it to the libraries listed below
Sorting:
- Reflective DLL self-loading as a library☆22Updated 4 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆79Updated 3 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆54Updated 10 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆60Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆29Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 10 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆47Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Youtube channel sample code☆53Updated last week
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Updated last year
- Example of building an application verifer DLL☆49Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆52Updated last year
- ☆83Updated last year
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆46Updated last year
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆63Updated 2 years ago
- A small C/C++ library to lookup Windows error codes.☆23Updated last year
- Get your data from the resource section manually, with no need for windows apis☆64Updated 11 months ago
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆38Updated last year
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆99Updated 3 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 6 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆40Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆55Updated last year
- Self Delete DLL☆23Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆74Updated 10 months ago
- Playing with packets in C#☆14Updated last year
- Load and execute a common object file format (COFF) in the current process☆31Updated last year
- Create file system symbolic links from low privileged user accounts within PowerShell☆96Updated 3 years ago