RPC Monitor tool based on Event Tracing for Windows
☆395Aug 19, 2024Updated last year
Alternatives and similar repositories for RPCMon
Users that are interested in RPCMon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploring RPC interfaces on Windows☆352Jan 30, 2024Updated 2 years ago
- A tool that shows detailed information about named pipes in Windows☆744Nov 15, 2024Updated last year
- ☆210Apr 5, 2022Updated 4 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,056Sep 24, 2023Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆112Aug 7, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- ☆544Jun 6, 2025Updated 11 months ago
- A little tool to play with the Seclogon service☆326Jul 10, 2022Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆630Oct 19, 2023Updated 2 years ago
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆210Feb 29, 2024Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆959Feb 2, 2026Updated 3 months ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆319Mar 20, 2024Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆253Jul 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Coerce Windows machines auth via MS-EVEN☆175Jan 17, 2024Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆140Dec 20, 2022Updated 3 years ago
- Security product hook detection☆330Mar 30, 2021Updated 5 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆404Aug 15, 2025Updated 9 months ago
- Running .NET from VBA☆147Feb 11, 2023Updated 3 years ago
- ☆514Aug 14, 2022Updated 3 years ago
- An advanced tool for working with access tokens and Windows security policy.☆650May 10, 2026Updated last week
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆379May 24, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A DTrace on Windows Reimplementation☆373May 6, 2026Updated 2 weeks ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,218Jun 17, 2022Updated 3 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- ☆170Jan 7, 2022Updated 4 years ago
- Dump the memory of a PPL with a userland exploit☆892Jul 24, 2022Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- Sysmon-Like research tool for ETW☆389Nov 15, 2022Updated 3 years ago
- ☆107Jul 31, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆382Updated this week
- A simple program to hook the current process to identify the manual syscall executions on windows☆268Nov 18, 2022Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆147Feb 23, 2019Updated 7 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,638Jul 31, 2024Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago