Some Code Samples for Windows based Inter-Process-Communication (IPC)
☆209Feb 29, 2024Updated 2 years ago
Alternatives and similar repositories for InterProcessCommunication-Samples
Users that are interested in InterProcessCommunication-Samples are comparing it to the libraries listed below
Sorting:
- ☆85Jan 12, 2022Updated 4 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,042Sep 24, 2023Updated 2 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- RPC Monitor tool based on Event Tracing for Windows☆383Aug 19, 2024Updated last year
- Sysmon-Like research tool for ETW☆384Nov 15, 2022Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- Exploring RPC interfaces on Windows☆345Jan 30, 2024Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆299Apr 10, 2021Updated 4 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- Sleep Obfuscation☆816Dec 3, 2023Updated 2 years ago
- Advance LPC☆72May 2, 2017Updated 8 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Jul 31, 2019Updated 6 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- C# Utilities for Windows Notification Facility☆159Apr 14, 2025Updated 10 months ago
- A set of programs for analyzing common vulnerabilities in COM☆248Sep 8, 2024Updated last year
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆501Jan 25, 2022Updated 4 years ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- ☆130Dec 4, 2023Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆553Apr 8, 2025Updated 10 months ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- C++ library for low-level Windows development☆81Apr 12, 2024Updated last year
- ☆60Jan 9, 2023Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆917Jul 20, 2024Updated last year
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Protected Process Light Library☆18Jun 20, 2020Updated 5 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆485May 18, 2021Updated 4 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Mar 26, 2024Updated last year
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Windows Kernel Programming Experiments☆84Sep 18, 2022Updated 3 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆197Dec 6, 2022Updated 3 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆144May 10, 2022Updated 3 years ago
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago