Mr-Un1k0d3r / WindowsDllsExportLinks
A list of all the DLLs export in C:\windows\system32\
☆219Updated 3 years ago
Alternatives and similar repositories for WindowsDllsExport
Users that are interested in WindowsDllsExport are comparing it to the libraries listed below
Sorting:
- Stop Windows Defender using the Win32 API☆194Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Updated 3 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆129Updated 2 years ago
- ☆184Updated 3 years ago
- ☆113Updated 3 years ago
- ☆72Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆241Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆107Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Userland API Unhooker Project☆109Updated 4 years ago
- Koppeling x Metatwin x LazySign☆213Updated 3 years ago
- Simple reverse shell to avoid Win 11 defender detection☆120Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- A collection of weird ways to execute unmanaged code in .NET☆170Updated 4 years ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆262Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆215Updated 5 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆166Updated 3 years ago
- Evasive Process Hollowing Techniques☆141Updated 4 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 4 years ago
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆189Updated 5 years ago
- ☆146Updated 2 years ago