SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and update processes.
☆264Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for SetupHijack
Users that are interested in SetupHijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- "Service-less" driver loading☆185Nov 28, 2024Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆573Nov 1, 2025Updated 5 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆72Mar 24, 2026Updated 3 weeks ago
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆61Sep 7, 2024Updated last year
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆158Jul 22, 2025Updated 8 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆168Sep 22, 2025Updated 6 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆359Mar 17, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Project for generating and identifying deceptive LNK files.☆318Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Process Injection using Thread Name☆308Apr 18, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆190Jan 11, 2026Updated 3 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A runtime for developing large-scale and complex shellcode.☆22Mar 31, 2026Updated 2 weeks ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆653Oct 27, 2025Updated 5 months ago
- ☆38Apr 15, 2025Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- Finding Truth in the Shadows☆126Jan 26, 2023Updated 3 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Rust crate to run commands as another user☆54Feb 12, 2026Updated 2 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆139Dec 20, 2022Updated 3 years ago
- ACL Viewer for Windows☆133May 4, 2025Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago