An example of COM hijacking using a proxy DLL.
☆44Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for COM-Hijacking
Users that are interested in COM-Hijacking are comparing it to the libraries listed below
Sorting:
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆17Jan 9, 2025Updated last year
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆33Mar 19, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆301Apr 10, 2021Updated 4 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 8 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- ☆139Jan 16, 2025Updated last year
- dump Chrome cookies remotely with atexec and CDP☆69Aug 10, 2024Updated last year
- COM Hijacking VOODOO☆377Nov 27, 2025Updated 3 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆186Dec 23, 2025Updated 2 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- ☆119Aug 7, 2022Updated 3 years ago
- ☆65Dec 19, 2024Updated last year
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 7 months ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- stop any process from looking into your process by hooking.☆21Apr 2, 2024Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago