☆188Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for EventLogCrasher
Users that are interested in EventLogCrasher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆467Aug 2, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆212Mar 10, 2024Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆251Jun 11, 2024Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- ☆346Nov 10, 2025Updated 5 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆308Mar 28, 2026Updated last month
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆170May 30, 2024Updated last year
- ☆102Oct 7, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- Library of BOFs to interact with SQL servers☆234Dec 3, 2025Updated 5 months ago
- ☆414Dec 8, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- ☆187Apr 24, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 3 months ago
- Native Syscalls Shellcode Injector☆268Jul 2, 2023Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 5 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆307Mar 15, 2025Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆393Apr 4, 2026Updated last month
- ☆127Sep 1, 2024Updated last year
- ☆84May 19, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆411Mar 16, 2026Updated last month
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆290Jan 21, 2024Updated 2 years ago
- Amazing whoami alternatives☆141Mar 23, 2024Updated 2 years ago
- Execute shellcode files with rundll32☆219Jan 28, 2024Updated 2 years ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆441Jul 8, 2024Updated last year
- ☆108Aug 21, 2024Updated last year