gentilkiwi / basic_rpcLinks
Samples about Microsoft RPC and native API calls in Windows C
☆62Updated 8 years ago
Alternatives and similar repositories for basic_rpc
Users that are interested in basic_rpc are comparing it to the libraries listed below
Sorting:
- s(4)u for Windows☆48Updated 4 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- DLL Injection Library & Tools☆72Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- A simple shellcode runner☆20Updated 11 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- Dump Windows PE file information in C☆23Updated 10 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- ☆51Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆50Updated 3 years ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33Updated 6 years ago
- Anti-AV compilation☆43Updated 11 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- ransomware_begone☆42Updated 9 years ago
- MALM: Malware Monitor☆49Updated 11 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- ☆34Updated 9 years ago
- A command tree based on commands and extensions for Windows Kernel Debugging.☆108Updated 4 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆94Updated 6 years ago
- Ruxcon2016 POC Code☆139Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 3 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆91Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆34Updated 7 years ago
- Windows Console Monitoring☆99Updated 7 years ago