erwan2212 / NTHASH-FPCLinks
☆35Updated 2 years ago
Alternatives and similar repositories for NTHASH-FPC
Users that are interested in NTHASH-FPC are comparing it to the libraries listed below
Sorting:
- Some random system tools for Windows☆114Updated 3 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Updated 3 years ago
- Run shellcode through InnoSetup code engine.☆69Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- ☆34Updated last year
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆76Updated 2 years ago
- Example/starter code for custom Windows application compatibility shims☆35Updated 4 years ago
- Tool to convert SDDL to readable text☆41Updated 7 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆49Updated 2 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Security Descriptor Definition Language (SDDL) Parser☆38Updated 5 years ago
- Command line utility for copying files on NTFS using low level disk access☆36Updated last year
- Create file system symbolic links from low privileged user accounts within PowerShell☆96Updated 3 years ago
- ☆20Updated 2 months ago
- 2 ways of Password Filter DLL to record the plaintext password☆64Updated 4 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 3 years ago
- ☆35Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes☆50Updated 3 years ago
- ☆45Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- code for the Proxy DLL example blog post☆62Updated 3 years ago
- ☆12Updated 2 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- Self delete DLL (2)☆14Updated last year
- ☆28Updated 2 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆62Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago