alfarom256 / LogMeInPoCHandleDupLinks
☆64Updated last year
Alternatives and similar repositories for LogMeInPoCHandleDup
Users that are interested in LogMeInPoCHandleDup are comparing it to the libraries listed below
Sorting:
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 6 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆192Updated last week
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆103Updated last year
- ☆147Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆115Updated 7 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- A more reliable way of resolving syscall numbers in Windows☆51Updated last year
- "Service-less" driver loading☆156Updated 7 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- ☆107Updated 8 months ago
- ☆111Updated 6 months ago
- ☆28Updated last year
- ☆155Updated 7 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆122Updated 10 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆113Updated 10 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- ☆111Updated 7 months ago
- Activation Context Hijack☆155Updated 7 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- ☆61Updated last year
- ☆76Updated 11 months ago
- A collection of position independent coding resources☆80Updated 5 months ago
- ☆30Updated 7 months ago
- ☆49Updated 3 months ago
- ☆105Updated last year
- A process injection technique using only thread context manipulation☆38Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆35Updated last month