josh0xA / win32-iatLinks
Small attempt at a decent Import Address Table (IAT) Dumper
☆15Updated 9 months ago
Alternatives and similar repositories for win32-iat
Users that are interested in win32-iat are comparing it to the libraries listed below
Sorting:
- Zero-Day Code Injection and Persistence Technique☆33Updated 8 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆76Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆31Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆176Updated 9 months ago
- A silly PAM module to allow authentication as any user with a single password.☆55Updated 5 years ago
- Landing page for calebstew.art☆23Updated 3 years ago
- x64 Windows Exploit Development☆111Updated 9 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆13Updated 5 months ago
- ☆76Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated last year
- My thoughts from going through the OSEP materials.☆21Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Port of "watershell" made by an alumni (wumb0) that I decided to port to C++☆2Updated 3 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆11Updated 5 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 9 months ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- This is a poor-mans framework to automate the creation of a CTFd instance, dynamically recreating challenges and the interface.☆10Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆37Updated 4 years ago