Tool for obtaining information about PPL processes
☆16Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for PPLDescribe
Users that are interested in PPLDescribe are comparing it to the libraries listed below
Sorting:
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- ☆27May 1, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆10Jun 26, 2024Updated last year
- really ?☆12Feb 29, 2024Updated 2 years ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆145Feb 1, 2026Updated last month
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- ☆12Feb 19, 2026Updated last week
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- Setup for windows kernel development (development, debugging automation and compiling)☆17Jan 30, 2021Updated 5 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- ☆20May 1, 2023Updated 2 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- A prototype for implementing Azure Service Principal Impersonation using Azure Functions and Key Vault. This project demonstrates an appr…☆17Feb 26, 2025Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- ☆44Jul 9, 2024Updated last year
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- ☆163Oct 25, 2023Updated 2 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Aug 2, 2022Updated 3 years ago
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated 2 years ago
- ☆43Oct 28, 2021Updated 4 years ago
- Hiding SSH public keys in SSH server using a kernel agent☆23Dec 24, 2020Updated 5 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Dec 16, 2023Updated 2 years ago