cyberark / PipeViewer
A tool that shows detailed information about named pipes in Windows
☆617Updated 4 months ago
Alternatives and similar repositories for PipeViewer:
Users that are interested in PipeViewer are comparing it to the libraries listed below
- PoCs and tools for investigation of Windows process execution techniques☆912Updated last week
- ☆570Updated 4 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,031Updated last year
- UAC bypass by abusing RPC and debug objects.☆611Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆488Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆487Updated last year
- RPC Monitor tool based on Event Tracing for Windows☆341Updated 7 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆840Updated 2 months ago
- ☆467Updated 4 months ago
- ☆373Updated 6 months ago
- Various ways to execute shellcode☆487Updated last year
- ☆490Updated last year
- Living Off The Land Drivers☆1,137Updated 2 weeks ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆732Updated 2 years ago
- A Highly capable Pe Packer☆693Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆359Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- A C# utility for interacting with SCCM☆616Updated 6 months ago
- a tool to help operate in EDRs' blind spots☆722Updated 3 months ago
- Because AV evasion should be easy.☆676Updated 3 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆368Updated 10 months ago
- Protected Process Dumper Tool☆533Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆721Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆539Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆912Updated 9 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆579Updated 3 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆996Updated 5 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆473Updated last year
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆515Updated last month
- .net config loader☆313Updated last year