A simple XLL, showing how to create an XLL from scratch.
☆50Jan 6, 2016Updated 10 years ago
Alternatives and similar repositories for HelloWorldXll
Users that are interested in HelloWorldXll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Fast and flexible challenge downloader for all major CTF platforms☆14Oct 20, 2025Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆373Oct 30, 2020Updated 5 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated last month
- Runs given command as screensaver☆12Feb 20, 2017Updated 9 years ago
- go实现的各种字符串匹配算法☆18Jun 21, 2017Updated 8 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated last month