diversenok / TokenUniverseLinks
An advanced tool for working with access tokens and Windows security policy.
☆629Updated last month
Alternatives and similar repositories for TokenUniverse
Users that are interested in TokenUniverse are comparing it to the libraries listed below
Sorting:
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆877Updated last month
- Loads any C# binary in mem, patching AMSI + ETW.☆839Updated 4 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆498Updated 4 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆711Updated 2 years ago
- LoadLibrary for offensive operations☆1,173Updated 4 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Updated this week
- Enumerate and disable common sources of telemetry used by AV/EDR.☆817Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆821Updated 2 years ago
- RPC Monitor tool based on Event Tracing for Windows☆383Updated last year
- ☆614Updated 3 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆801Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,083Updated 2 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆588Updated 3 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆555Updated 2 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆610Updated 2 years ago
- ☆501Updated 3 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Updated last year
- Tools and PoCs for Windows syscall investigation.☆367Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆891Updated 3 years ago
- Various ways to execute shellcode☆508Updated last year
- Process Hollowing (Malware Technique)☆1,383Updated 4 months ago
- A way to delete a locked file, or current running executable, on disk.☆615Updated 3 months ago
- A tool that shows detailed information about named pipes in Windows☆731Updated last year
- TartarusGate, Bypassing EDRs☆647Updated 4 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆422Updated last year
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆619Updated 2 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆872Updated 5 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆769Updated 3 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆899Updated last year