cyberark / PipeViewer
A tool that shows detailed information about named pipes in Windows
☆611Updated 3 months ago
Alternatives and similar repositories for PipeViewer:
Users that are interested in PipeViewer are comparing it to the libraries listed below
- ☆569Updated 4 months ago
- PoCs and tools for investigation of Windows process execution techniques☆908Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆1,027Updated last year
- UAC bypass by abusing RPC and debug objects.☆610Updated last year
- RPC Monitor tool based on Event Tracing for Windows☆340Updated 6 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆839Updated last month
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆486Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆486Updated last year
- ☆487Updated last year
- Various ways to execute shellcode☆485Updated last year
- Tools and PoCs for Windows syscall investigation.☆358Updated 2 months ago
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆724Updated 2 weeks ago
- ☆467Updated 3 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- ☆1,605Updated 6 months ago
- Living Off The Land Drivers☆1,127Updated this week
- ☆375Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆721Updated 3 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆505Updated 2 years ago
- Protected Process Dumper Tool☆532Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆909Updated 9 months ago
- Simulate the behavior of AV/EDR for malware development training.☆501Updated last year
- ☆357Updated 6 months ago
- Exploring RPC interfaces on Windows☆318Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆948Updated last year
- Aims to identify sleeping beacons☆569Updated 3 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆723Updated 2 years ago
- ☆296Updated 4 months ago
- Analyse your malware to surgically obfuscate it☆454Updated 2 weeks ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆721Updated last year