josh0xA / win32-iat
Small attempt at a decent Import Address Table (IAT) Dumper
☆14Updated 7 months ago
Alternatives and similar repositories for win32-iat:
Users that are interested in win32-iat are comparing it to the libraries listed below
- Zero-Day Code Injection and Persistence Technique☆33Updated 8 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆75Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆55Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆175Updated 7 months ago
- Landing page for calebstew.art☆23Updated 3 years ago
- A simple "ransomware" using powershell☆14Updated 3 years ago
- This is a repository to house convenient things for the 2019 PCDC competition.☆13Updated 5 years ago
- my reading list for reverse engineering malware & exploit development☆13Updated 2 months ago
- x64 Windows Exploit Development☆110Updated 7 months ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆43Updated 4 years ago
- Python, C++ and Go☆22Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 4 years ago
- Port of "watershell" made by an alumni (wumb0) that I decided to port to C++☆2Updated 3 years ago
- CTF toolbox☆22Updated 2 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Python API for interacting with sigma rules.☆50Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- 0xpat blog☆101Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago