SafeBreach-Labs / MagicDotLinks
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue
☆99Updated last year
Alternatives and similar repositories for MagicDot
Users that are interested in MagicDot are comparing it to the libraries listed below
Sorting:
- ☆78Updated last year
- Select any exported function in a dll as the new dll's entry point.☆81Updated 9 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- Blog/Journal on how to backdoor VSCode extensions☆63Updated 2 weeks ago
- ☆76Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 4 months ago
- ☆100Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 6 months ago
- ☆28Updated last year
- ☆30Updated 8 months ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- ☆61Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆50Updated last year
- Splitting and executing shellcode across multiple pages☆102Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- ☆74Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- miscellaneous codes☆35Updated last year
- Template-based generation of shellcode loaders☆78Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆123Updated 10 months ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year
- ☆136Updated 2 years ago