Wh04m1001 / GamingServiceEoP5Links
☆31Updated last year
Alternatives and similar repositories for GamingServiceEoP5
Users that are interested in GamingServiceEoP5 are comparing it to the libraries listed below
Sorting:
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- ☆31Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 2 weeks ago
- ☆82Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- ☆77Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- ☆32Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆130Updated 2 weeks ago
- Sniffing files generator☆59Updated 10 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated 2 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 4 months ago
- ☆47Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- use python on windows with full submodule support without installation☆30Updated 11 months ago
- RPC to WebClient startup☆53Updated 4 months ago
- BOF for C2 framework☆44Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 11 months ago
- ☆59Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 11 months ago
- EvtPsst☆55Updated 2 years ago
- ☆43Updated last year
- ☆26Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- Commandline spoofing on Windows☆83Updated last month
- DFSCoerce exe revisited version with custom authentication☆41Updated last year