☆55Mar 26, 2025Updated last year
Alternatives and similar repositories for KeyJumper
Users that are interested in KeyJumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- ☆38Apr 15, 2025Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆79Nov 11, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆161Nov 23, 2025Updated 5 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆16May 16, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆153Apr 26, 2024Updated 2 years ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Mar 15, 2025Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- ☆108Aug 21, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Mentally ill EtwTi parser☆70Jan 11, 2026Updated 3 months ago
- ☆21Feb 22, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- ACL Viewer for Windows☆133May 4, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆57Jul 8, 2025Updated 9 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆203Jun 17, 2025Updated 10 months ago
- Position-independent Reflective Loader for macOS☆122Feb 19, 2026Updated 2 months ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆68Aug 25, 2022Updated 3 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆21Mar 28, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago