RPC Monitor tool based on Event Tracing for Windows
☆384Aug 19, 2024Updated last year
Alternatives and similar repositories for RPCMon
Users that are interested in RPCMon are comparing it to the libraries listed below
Sorting:
- Exploring RPC interfaces on Windows☆345Jan 30, 2024Updated 2 years ago
- A tool that shows detailed information about named pipes in Windows☆735Nov 15, 2024Updated last year
- ☆208Apr 5, 2022Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Dec 14, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆110Aug 7, 2025Updated 6 months ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,043Sep 24, 2023Updated 2 years ago
- A little tool to play with the Seclogon service☆327Jul 10, 2022Updated 3 years ago
- ☆534Jun 6, 2025Updated 8 months ago
- PoCs and tools for investigation of Windows process execution techniques☆953Feb 2, 2026Updated last month
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆209Feb 29, 2024Updated 2 years ago
- ☆505Aug 14, 2022Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,196Jun 17, 2022Updated 3 years ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆319Mar 20, 2024Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- A DTrace on Windows Reimplementation☆372Feb 3, 2026Updated 3 weeks ago
- WTSRM☆216Aug 7, 2022Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆374May 24, 2022Updated 3 years ago
- An advanced tool for working with access tokens and Windows security policy.☆634Dec 20, 2025Updated 2 months ago
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Aug 15, 2025Updated 6 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Tools and PoCs for Windows syscall investigation.☆368Dec 2, 2025Updated 3 months ago
- Sysmon-Like research tool for ETW☆384Nov 15, 2022Updated 3 years ago
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,594Jul 31, 2024Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆313Sep 16, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆311Nov 29, 2023Updated 2 years ago
- Sleep Obfuscation☆816Dec 3, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆355Updated this week
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆136Dec 20, 2022Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆172Jan 17, 2024Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆900Jan 21, 2025Updated last year