cyberark / PipeViewer
A tool that shows detailed information about named pipes in Windows
☆639Updated 6 months ago
Alternatives and similar repositories for PipeViewer
Users that are interested in PipeViewer are comparing it to the libraries listed below
Sorting:
- PoCs and tools for investigation of Windows process execution techniques☆916Updated 2 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,039Updated last year
- ☆572Updated 2 weeks ago
- RPC Monitor tool based on Event Tracing for Windows☆355Updated 8 months ago
- UAC bypass by abusing RPC and debug objects.☆615Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆496Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆492Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆861Updated 3 months ago
- Various ways to execute shellcode☆491Updated last year
- ☆490Updated last year
- Tools and PoCs for Windows syscall investigation.☆360Updated 4 months ago
- ☆381Updated 3 weeks ago
- Important notes and topics on my journey towards mastering Windows Internals☆383Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆742Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆636Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆232Updated last year
- Threadless Process Injection using remote function hooking.☆753Updated 8 months ago
- ☆378Updated 2 years ago
- ☆469Updated 5 months ago
- Protected Process Dumper Tool☆546Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆409Updated 9 months ago
- Lifetime AMSI bypass☆626Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆491Updated last year
- ☆301Updated 6 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆511Updated 2 years ago
- Tools for interacting with authentication packages using their individual message protocols☆331Updated last month
- Simulate the behavior of AV/EDR for malware development training.☆523Updated last year
- Aims to identify sleeping beacons☆591Updated 5 months ago
- Microsoft Signed PowerShell scripts☆214Updated 2 years ago
- ☆1,646Updated 8 months ago