Mr-Un1k0d3r / WindowsDllsExport
A list of all the DLLs export in C:\windows\system32\
☆215Updated 3 years ago
Alternatives and similar repositories for WindowsDllsExport:
Users that are interested in WindowsDllsExport are comparing it to the libraries listed below
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆140Updated 3 years ago
- You shall pass☆256Updated 2 years ago
- Fully modular persistence framework☆251Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆320Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆240Updated 3 years ago
- ☆181Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆262Updated 4 years ago
- C# Lsass parser☆289Updated 3 years ago
- Remove API hooks from a Beacon process.☆268Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆188Updated 3 years ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆244Updated 3 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆187Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆333Updated 2 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆157Updated 4 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆154Updated last year
- A collection of weird ways to execute unmanaged code in .NET☆162Updated 3 years ago
- A little tool to play with the Seclogon service☆308Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆366Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆301Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆210Updated 4 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago