cyberark / RPCMon
RPC Monitor tool based on Event Tracing for Windows
☆330Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for RPCMon
- Sysmon-Like research tool for ETW☆336Updated 2 years ago
- Exploring RPC interfaces on Windows☆284Updated 9 months ago
- Tools and PoCs for Windows syscall investigation.☆354Updated 6 months ago
- Security product hook detection☆311Updated 3 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆544Updated last year
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆311Updated last year
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆292Updated 8 months ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆254Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆621Updated last year
- ☆461Updated 2 years ago
- ☆290Updated 3 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆628Updated last year
- Expriments☆442Updated last month
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆199Updated 2 years ago
- A way to delete a locked file, or current running executable, on disk.☆499Updated 3 months ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆341Updated 2 years ago
- ☆471Updated 3 weeks ago
- Leaked Windows processes handles identification tool☆272Updated 2 years ago
- Yet another variant of Process Hollowing☆355Updated 8 months ago
- PoCs and tools for investigation of Windows process execution techniques☆882Updated this week
- View ETW Provider manifest☆433Updated 2 weeks ago
- Aims to identify sleeping beacons☆489Updated 5 months ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆329Updated 3 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆521Updated 11 months ago
- C# Reflective loader for unmanaged binaries.☆419Updated last year
- Dump the memory of a PPL with a userland exploit☆845Updated 2 years ago
- For when DLLMain is the only way☆353Updated 3 weeks ago
- ☆506Updated 8 months ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆351Updated 2 years ago
- TartarusGate, Bypassing EDRs☆533Updated 2 years ago