Wh04m1001 / GamingServiceEoPLinks
☆147Updated last year
Alternatives and similar repositories for GamingServiceEoP
Users that are interested in GamingServiceEoP are comparing it to the libraries listed below
Sorting:
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 5 months ago
- ☆63Updated last year
- Find DLLs with RWX section☆81Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ☆190Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Local & remote Windows DLL Proxying☆164Updated 11 months ago
- Exploitation of process killer drivers☆201Updated last year
- Find .net assemblies locally☆113Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆130Updated last year
- Bypass LSA protection using the BYODLL technique☆161Updated 8 months ago
- ☆184Updated last year
- DLL proxying for lazy people☆159Updated 6 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆110Updated 8 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- An example reference design for a proposed BOF PE☆168Updated last month
- CVE-2024-30090 - LPE PoC☆107Updated 7 months ago
- ☆155Updated 5 months ago
- ☆61Updated last year
- ☆163Updated last year
- Weaponized HellsGate/SigFlip☆199Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- ☆110Updated 6 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆101Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆264Updated 8 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆93Updated last year
- ☆105Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆295Updated 2 months ago