diversenok / TokenUniverseLinks
An advanced tool for working with access tokens and Windows security policy.
☆620Updated 3 weeks ago
Alternatives and similar repositories for TokenUniverse
Users that are interested in TokenUniverse are comparing it to the libraries listed below
Sorting:
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆851Updated last week
- A .NET tool for exporting and importing certificates without touching disk.☆499Updated 4 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆841Updated 4 years ago
- PoCs and tools for investigation of Windows process execution techniques☆945Updated last month
- Execute unmanaged Windows executables in CobaltStrike Beacons☆711Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆790Updated last year
- Enumerate and disable common sources of telemetry used by AV/EDR.☆813Updated 4 years ago
- ☆495Updated 3 years ago
- LoadLibrary for offensive operations☆1,167Updated 4 years ago
- Sysmon-Like research tool for ETW☆377Updated 3 years ago
- ☆607Updated last month
- ☆529Updated 6 months ago
- Various ways to execute shellcode☆508Updated last year
- RPC Monitor tool based on Event Tracing for Windows☆376Updated last year
- Exploring RPC interfaces on Windows☆336Updated last year
- A tool that shows detailed information about named pipes in Windows☆720Updated last year
- Expriments☆475Updated last year
- KaynLdr is a Reflective Loader written in C/ASM☆556Updated 2 years ago
- Aims to identify sleeping beacons☆642Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆667Updated 2 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆583Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆367Updated last week
- A centralized resource for previously documented WDAC bypass techniques☆596Updated 3 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆578Updated last year
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆612Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆470Updated 5 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆895Updated 10 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Updated 3 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆711Updated 2 years ago