OmriBaso / WTSImpersonatorView external linksLinks
WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"
☆122Jul 2, 2024Updated last year
Alternatives and similar repositories for WTSImpersonator
Users that are interested in WTSImpersonator are comparing it to the libraries listed below
Sorting:
- ☆563Feb 22, 2024Updated last year
- RunPE implementation with multiple evasive techniques (1)☆381Sep 22, 2023Updated 2 years ago
- ☆301Oct 29, 2024Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 4 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- ☆206Apr 5, 2022Updated 3 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆563Jan 20, 2026Updated 3 weeks ago
- Bypassing UAC with SSPI Datagram Contexts☆460Sep 24, 2023Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Jan 2, 2023Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Abuse leaked token handles.☆134Dec 14, 2023Updated 2 years ago
- .net config loader☆348Nov 9, 2023Updated 2 years ago
- ☆244Sep 19, 2023Updated 2 years ago
- You shall pass☆271Jul 16, 2022Updated 3 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- ☆504Aug 14, 2022Updated 3 years ago
- Find .net assemblies locally☆131Oct 14, 2022Updated 3 years ago
- ☆778Oct 17, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆408Jan 11, 2026Updated last month
- ☆139Jan 16, 2025Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆166May 17, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆222Dec 3, 2025Updated 2 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆360Mar 2, 2024Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Jun 29, 2024Updated last year
- Your syscall factory☆126Jan 13, 2026Updated last month
- ☆142May 4, 2022Updated 3 years ago
- A C# port from Invoke-GhostTask☆119Jan 5, 2024Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆282Jun 18, 2025Updated 7 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago