SolomonSklash / COM-Hijacking
An example of COM hijacking using a proxy DLL.
☆20Updated 3 years ago
Related projects: ⓘ
- ☆23Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆19Updated 4 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆32Updated 3 years ago
- ☆44Updated 3 years ago
- ☆14Updated last year
- ☆20Updated 3 years ago
- ☆14Updated 2 years ago
- ☆24Updated this week
- ☆25Updated this week
- ☆16Updated this week
- API Hammering with C++20☆34Updated 2 years ago
- ☆13Updated this week
- Dangling COM Keys Finder☆14Updated 2 years ago
- really ?☆12Updated 6 months ago
- ☆10Updated 4 years ago
- Remove API hooks from a Beacon process.☆12Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- ☆22Updated 3 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆31Updated this week
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- A simple Linux in-memory .so loader☆25Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Updated 2 years ago
- Disable PPL via custom driver and dump lsass☆13Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆37Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 2 years ago