apriorit / SvcHostDemo
Demo service that runs in svchost.exe
☆79Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SvcHostDemo
- Lightweight Portable Executable parsing library and a demo peParser application.☆72Updated last year
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆35Updated 5 years ago
- Used to create wrappers and proxy libraries for Windows binaries.☆71Updated 12 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆85Updated 9 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆92Updated 6 years ago
- Add an empty section to a PE file☆50Updated 7 years ago
- Assembly block for hooking windows API functions.☆81Updated 5 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆135Updated 5 years ago
- Convert PE files to a shellcode☆73Updated 4 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆99Updated 5 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆13Updated last year
- ☆67Updated last year
- Reflective PE loader for DLL injection☆167Updated 7 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆81Updated 7 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆148Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆41Updated last month
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆92Updated 5 years ago
- Run any executable as SYSTEM account (no service required)☆123Updated 6 months ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- ☆186Updated 2 years ago
- Run Processes as PPL with ELAM☆146Updated 2 years ago
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- C++☆79Updated 8 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆103Updated 3 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 7 years ago