Analysis and manipulation of extended attribute ($EA) on NTFS
☆38Jul 27, 2015Updated 10 years ago
Alternatives and similar repositories for EaTools
Users that are interested in EaTools are comparing it to the libraries listed below
Sorting:
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- ☆21Jan 11, 2022Updated 4 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Decode security descriptors in $Secure on NTFS☆22Feb 24, 2022Updated 4 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 4 months ago
- Ping Exfiltration Command and Control (PiX-C2)☆32May 15, 2015Updated 10 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- Parser for $LogFile on NTFS☆215Jun 1, 2025Updated 9 months ago
- Azure Cloud HSM SDK☆17Feb 20, 2026Updated 2 weeks ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Feb 19, 2026Updated 2 weeks ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- ☆41Mar 23, 2023Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Библиотека для работы с криптопровайдером АО "НУЦ" KalkanCrypt☆11Feb 18, 2026Updated 2 weeks ago
- ☆13Nov 5, 2024Updated last year
- Windows MSI Installer LPE (CVE-2021-43883)☆79Dec 17, 2021Updated 4 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago