gabriel-sztejnworcel / pipe-intercept
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
☆170Updated 2 years ago
Alternatives and similar repositories for pipe-intercept:
Users that are interested in pipe-intercept are comparing it to the libraries listed below
- Bring your own print driver privilege escalation tool☆247Updated 3 years ago
- Koppeling x Metatwin x LazySign☆206Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆332Updated 2 years ago
- ☆187Updated 2 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆226Updated 3 years ago
- Hookers are cooler than patches.☆168Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆231Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆216Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆166Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆140Updated 3 years ago
- ☆205Updated 2 years ago
- Managed code hooking template.☆107Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- Microsoft Signed PowerShell scripts☆213Updated last year
- Just some Rust process injector POCs, nothing weird.☆80Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆186Updated 3 years ago
- C# Lsass parser☆284Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆257Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆321Updated 11 months ago
- ☆363Updated 3 years ago
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆147Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆352Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆329Updated 3 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆166Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆186Updated 3 years ago