Windows internals and exploitation tricks
☆112Nov 9, 2025Updated 3 months ago
Alternatives and similar repositories for Pentest-Windows
Users that are interested in Pentest-Windows are comparing it to the libraries listed below
Sorting:
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆374May 24, 2022Updated 3 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Jan 15, 2022Updated 4 years ago
- ☆137Aug 2, 2022Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- ☆132Oct 14, 2022Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆31Dec 5, 2024Updated last year
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- miscellaneous scripts and programs☆277Jan 23, 2025Updated last year
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated 2 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- ☆113Oct 10, 2022Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- A windows token impersonation tool☆319Apr 19, 2023Updated 2 years ago
- ☆274Jan 14, 2023Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- ☆118Aug 7, 2022Updated 3 years ago
- Minifilter Callback Patching Proof-of-Concept☆74Oct 31, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 weeks ago
- ☆92Aug 23, 2021Updated 4 years ago
- ☆382Jan 19, 2023Updated 3 years ago