☆53Mar 26, 2025Updated 11 months ago
Alternatives and similar repositories for KeyJumper
Users that are interested in KeyJumper are comparing it to the libraries listed below
Sorting:
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- ☆38Apr 15, 2025Updated 10 months ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆334Mar 6, 2025Updated 11 months ago
- ☆26Nov 8, 2024Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Mar 15, 2025Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆199Jun 17, 2025Updated 8 months ago
- ☆108Aug 21, 2024Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- ☆21Feb 22, 2025Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆82Jun 21, 2025Updated 8 months ago
- ntoskrnl .data hooks for UM-KM communication☆54May 26, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆151Apr 26, 2024Updated last year
- Position-independent Reflective Loader for macOS☆118Feb 19, 2026Updated last week
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated 2 weeks ago
- TokenCert☆102Nov 15, 2024Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago
- ☆52Jul 8, 2025Updated 7 months ago