cyberark / PipeViewerLinks
A tool that shows detailed information about named pipes in Windows
☆718Updated last year
Alternatives and similar repositories for PipeViewer
Users that are interested in PipeViewer are comparing it to the libraries listed below
Sorting:
- PoCs and tools for investigation of Windows process execution techniques☆946Updated last month
- Spartacus DLL/COM Hijacking Toolkit☆1,071Updated last year
- ☆607Updated last month
- UAC bypass by abusing RPC and debug objects.☆628Updated 2 years ago
- RPC Monitor tool based on Event Tracing for Windows☆377Updated last year
- ☆513Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆495Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆512Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆895Updated 11 months ago
- Tools and PoCs for Windows syscall investigation.☆367Updated 3 weeks ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆670Updated 3 years ago
- Hardcore Debugging☆927Updated 2 weeks ago
- Important notes and topics on my journey towards mastering Windows Internals☆420Updated last year
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆693Updated last year
- ☆419Updated 8 months ago
- Exploring RPC interfaces on Windows☆338Updated last year
- Various ways to execute shellcode☆508Updated last year
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆867Updated 5 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆471Updated 6 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆501Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆764Updated 3 years ago
- Collect Windows telemetry for Maldev☆448Updated last month
- Win32 and Kernel abusing techniques for pentesters☆972Updated 2 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆522Updated 6 months ago
- ☆496Updated 3 years ago
- Aims to identify sleeping beacons☆646Updated this week
- Because AV evasion should be easy.☆843Updated last year
- Lifetime AMSI bypass☆664Updated 2 years ago
- Signtool for expired certificates☆501Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆739Updated 4 months ago