kargisimos / detenv
A small and portable Windows C library for sandbox detection
☆34Updated last year
Alternatives and similar repositories for detenv:
Users that are interested in detenv are comparing it to the libraries listed below
- in-process powershell runner for BRC4☆45Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- ☆79Updated last year
- ☆48Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆81Updated 6 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- ☆81Updated 11 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆54Updated 6 months ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- To audit the security of read-only domain controllers☆115Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 3 months ago
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 7 months ago
- A LAPS dumper written using the impacket library.☆31Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- ☆69Updated last year
- DFSCoerce exe revisited version with custom authentication☆39Updated last year
- I have documented all of the AMSI patches that I learned till now☆71Updated 3 weeks ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- C# havoc implant☆99Updated 2 years ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- PowerShell script to terminate protected processes such as anti-malware and EDRs.☆26Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆110Updated 2 years ago
- Source code and examples for PassiveAggression☆54Updated 10 months ago