diversenok / NtToolsLinks
Some random system tools for Windows
☆115Updated 3 years ago
Alternatives and similar repositories for NtTools
Users that are interested in NtTools are comparing it to the libraries listed below
Sorting:
- Run shellcode through InnoSetup code engine.☆70Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆50Updated 2 years ago
- ☆34Updated last year
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆78Updated 2 years ago
- ☆35Updated 2 years ago
- Windows (ShadowMove) Socket Duplication☆87Updated 5 years ago
- Windows user-land hooks manipulation tool.☆146Updated 4 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆55Updated 4 years ago
- Small POC for process ghosting☆40Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆106Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- Simple DLL that add a user to the local Administrators group☆78Updated 3 years ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆73Updated last year
- ☆70Updated 9 months ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 4 years ago
- UUID based Shellcode loader for your favorite C2☆86Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- ☆62Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆140Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆123Updated 3 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- ☆57Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆128Updated 3 years ago
- ☆113Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago