cyberark / PipeViewer
A tool that shows detailed information about named pipes in Windows
☆566Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for PipeViewer
- PoCs and tools for investigation of Windows process execution techniques☆881Updated 2 weeks ago
- ☆562Updated this week
- UAC bypass by abusing RPC and debug objects.☆601Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆992Updated 9 months ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆480Updated 9 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆810Updated last week
- ☆467Updated 10 months ago
- Various ways to execute shellcode☆475Updated 8 months ago
- RPC Monitor tool based on Event Tracing for Windows☆329Updated 2 months ago
- ☆350Updated 2 months ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆478Updated last year
- a tool to help operate in EDRs' blind spots☆652Updated 7 months ago
- A C# utility for interacting with SCCM☆570Updated last month
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆498Updated 2 years ago
- ☆462Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆492Updated 7 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆670Updated last year
- ☆377Updated last year
- Tools and PoCs for Windows syscall investigation.☆354Updated 6 months ago
- Protected Process Dumper Tool☆517Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆740Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆858Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆413Updated last year
- ☆481Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆621Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆663Updated this week
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆731Updated 4 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆876Updated 5 months ago