ctxis / DynamicWrapperEx
x64 Registration-Free In-Process COM Automation Server.
☆46Updated last year
Related projects: ⓘ
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆32Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- ☆14Updated 2 years ago
- ☆58Updated this week
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- A C port of b33f's UrbanBishop☆35Updated 3 years ago
- API Hammering with C++20☆34Updated 2 years ago
- Simple and sane compression wrapper library.☆17Updated last year
- Dangling COM Keys Finder☆14Updated 2 years ago
- ☆29Updated this week
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆24Updated 8 months ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- ☆16Updated this week
- ☆26Updated 4 years ago
- ☆48Updated last year
- A simple PE loader.☆25Updated last year
- ☆38Updated 11 months ago
- Loads .NET Assembly Via CLR Loader☆14Updated 5 years ago
- Get your data from the resource section manually, with no need for windows apis☆52Updated last year
- ☆58Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆26Updated 2 years ago
- Disable PPL via custom driver and dump lsass☆13Updated 3 years ago
- all credits go to @mgeeky☆58Updated 2 years ago
- ☆15Updated this week
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 2 years ago