Wh04m1001 / GamingServiceEoP5
☆28Updated 11 months ago
Alternatives and similar repositories for GamingServiceEoP5:
Users that are interested in GamingServiceEoP5 are comparing it to the libraries listed below
- Folder Or File Delete to Get System Shell on Current Session Desktop☆38Updated 3 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- use python on windows with full submodule support without installation☆28Updated 2 months ago
- ☆30Updated 4 months ago
- ☆79Updated last year
- Rust template/library for implementing your own COFF loader☆49Updated 2 months ago
- BOF for C2 framework☆40Updated 5 months ago
- ☆41Updated 9 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated last month
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- ☆28Updated 10 months ago
- Unix Process hollowing in rust☆21Updated 4 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- macOS dylib stager☆32Updated 2 months ago
- Impersonate Tokens using only NTAPI functions☆54Updated last week
- ☆48Updated last year
- ☆47Updated 2 years ago
- ForsHops☆40Updated 3 weeks ago
- Parser and reconciliation tooling for large Active Directory environments.☆32Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆38Updated 5 months ago
- Sample Rust Hooking Engine☆36Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- Sniffing files generator☆54Updated last month
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- ☆20Updated last month
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- ☆27Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago