MzHmO / USB-Monitor
USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices
☆21Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for USB-Monitor
- API Hammering with C++20☆34Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆36Updated 3 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- ☆27Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆51Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆22Updated 2 months ago
- ☆37Updated 3 weeks ago
- A pure C version of SymProcAddress☆23Updated 8 months ago
- ☆18Updated last month
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆64Updated last year
- ☆18Updated last year
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- ☆27Updated 4 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆73Updated last month
- convert compatible dlls to shellcode with sRDI. I don't remember where this came from, so if you recognize the code, let me know and I'll…☆12Updated 7 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- ☆34Updated last year
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆22Updated 6 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- EvtPsst☆54Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 6 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year