Some Code Samples for Windows based Inter-Process-Communication (IPC)
☆211Feb 29, 2024Updated 2 years ago
Alternatives and similar repositories for InterProcessCommunication-Samples
Users that are interested in InterProcessCommunication-Samples are comparing it to the libraries listed below
Sorting:
- ☆85Jan 12, 2022Updated 4 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,049Sep 24, 2023Updated 2 years ago
- Advance LPC☆72May 2, 2017Updated 8 years ago
- ☆23May 28, 2021Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- RPC Monitor tool based on Event Tracing for Windows☆388Aug 19, 2024Updated last year
- Sysmon-Like research tool for ETW☆387Nov 15, 2022Updated 3 years ago
- Exploring RPC interfaces on Windows☆346Jan 30, 2024Updated 2 years ago
- C# Utilities for Windows Notification Facility☆159Apr 14, 2025Updated 11 months ago
- Windows RPC Python fuzzer☆164Nov 14, 2017Updated 8 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- A set of programs for analyzing common vulnerabilities in COM☆249Sep 8, 2024Updated last year
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Jul 31, 2019Updated 6 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆301Apr 10, 2021Updated 4 years ago
- Sleep Obfuscation☆824Dec 3, 2023Updated 2 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- UAC bypass by abusing RPC and debug objects.☆628Oct 19, 2023Updated 2 years ago
- Windows Kernel Programming Experiments☆84Sep 18, 2022Updated 3 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆117Jan 21, 2025Updated last year
- Threadless Process Injection through entry point hijacking☆351Sep 10, 2024Updated last year
- A WinDbg extension to trace COM interactions☆131Aug 14, 2025Updated 7 months ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆559Apr 8, 2025Updated 11 months ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆170May 17, 2023Updated 2 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated last year
- ☆11Apr 26, 2021Updated 4 years ago
- ☆23Jan 9, 2019Updated 7 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- C++ library for low-level Windows development☆81Apr 12, 2024Updated last year
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Apr 24, 2022Updated 3 years ago