cyberark / PipeViewerLinks
A tool that shows detailed information about named pipes in Windows
☆688Updated 8 months ago
Alternatives and similar repositories for PipeViewer
Users that are interested in PipeViewer are comparing it to the libraries listed below
Sorting:
- PoCs and tools for investigation of Windows process execution techniques☆932Updated 2 weeks ago
- Spartacus DLL/COM Hijacking Toolkit☆1,050Updated last year
- ☆579Updated 2 months ago
- UAC bypass by abusing RPC and debug objects.☆621Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆505Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆494Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆873Updated 6 months ago
- RPC Monitor tool based on Event Tracing for Windows☆368Updated 11 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆652Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆361Updated 2 months ago
- Threadless Process Injection using remote function hooking.☆780Updated 11 months ago
- ☆500Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆403Updated last year
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆675Updated 9 months ago
- Various ways to execute shellcode☆494Updated last year
- Exploring RPC interfaces on Windows☆328Updated last year
- ☆387Updated 3 months ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆827Updated 5 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆664Updated 3 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆757Updated 2 years ago
- Hardcore Debugging☆903Updated 3 months ago
- Aims to identify sleeping beacons☆610Updated 8 months ago
- Win32 and Kernel abusing techniques for pentesters☆958Updated last year
- A Highly capable Pe Packer☆715Updated 2 years ago
- it is very good☆517Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,316Updated 3 weeks ago
- Simulate the behavior of AV/EDR for malware development training.☆532Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆483Updated last year
- Collect Windows telemetry for Maldev☆394Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆257Updated last year