cbwang505 / FilesystemEoPDesktopSystemShellLinks
Folder Or File Delete to Get System Shell on Current Session Desktop
☆45Updated 8 months ago
Alternatives and similar repositories for FilesystemEoPDesktopSystemShell
Users that are interested in FilesystemEoPDesktopSystemShell are comparing it to the libraries listed below
Sorting:
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆90Updated 3 weeks ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 10 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆68Updated 3 weeks ago
- use python on windows with full submodule support without installation☆30Updated 7 months ago
- ☆93Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆60Updated 7 months ago
- ☆100Updated last year
- ☆29Updated last year
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆43Updated last week
- ☆53Updated 8 months ago
- ☆81Updated last year
- ☆82Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- ☆28Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 7 months ago
- ☆53Updated 3 months ago
- BOF for C2 framework☆43Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- remote process injections using pool party techniques☆66Updated 2 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆87Updated last month
- Rust template/library for implementing your own COFF loader☆69Updated 7 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 6 months ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago