SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and update processes.
☆263Feb 2, 2026Updated 3 months ago
Alternatives and similar repositories for SetupHijack
Users that are interested in SetupHijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Windows rootkit designed to work with BYOVD exploits☆219Jan 18, 2025Updated last year
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆574Nov 1, 2025Updated 6 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆72Mar 24, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆61Sep 7, 2024Updated last year
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆160Jul 22, 2025Updated 9 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆171Sep 22, 2025Updated 7 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆362Mar 17, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Project for generating and identifying deceptive LNK files.☆331Mar 8, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Process Injection using Thread Name☆309Apr 18, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆63Nov 8, 2024Updated last year
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆190Jan 11, 2026Updated 3 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A runtime for developing large-scale and complex shellcode.☆22Updated this week
- ☆38Apr 15, 2025Updated last year
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆672Oct 27, 2025Updated 6 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- Finding Truth in the Shadows☆129Jan 26, 2023Updated 3 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆337Updated this week
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆139Dec 20, 2022Updated 3 years ago
- ACL Viewer for Windows☆133May 4, 2025Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Rust crate to run commands as another user☆58Feb 12, 2026Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year