Detects DLL hijacking in running processes on Windows systems
☆155Apr 2, 2015Updated 10 years ago
Alternatives and similar repositories for dll_hijack_detect
Users that are interested in dll_hijack_detect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ☆30May 23, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Elevation by environment variable expansion☆64Nov 24, 2016Updated 9 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Automated DLL Enumerator☆546Dec 21, 2017Updated 8 years ago
- DLL Hijacking Detection Tool☆545Aug 6, 2019Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- https://github.com/0xwindows/VulScritp.git☆25Apr 25, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 10 years ago
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- reversed emet tool☆24Oct 14, 2012Updated 13 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 11 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- CVE-2017-7269 回显PoC ,用于远程漏洞检测..☆89Oct 27, 2018Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago