MzHmO / USB-MonitorLinks
USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices
☆23Updated last year
Alternatives and similar repositories for USB-Monitor
Users that are interested in USB-Monitor are comparing it to the libraries listed below
Sorting:
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆20Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated 11 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆22Updated 8 months ago
- API Hammering with C++20☆49Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- Various methods of executing shellcode☆71Updated 2 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆56Updated 2 years ago
- using the gpu to hide your payload☆59Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- ☆32Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- BYOVD Technique Example using viragt64 driver☆43Updated 11 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- Windows LPE Nday☆26Updated last year
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Enabled / Disable LSA Protection via BYOVD☆71Updated 3 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆24Updated 11 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 9 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year