killvxk / Cisco_ASA_BackdoorLinks
☆10Updated 6 years ago
Alternatives and similar repositories for Cisco_ASA_Backdoor
Users that are interested in Cisco_ASA_Backdoor are comparing it to the libraries listed below
Sorting:
- Kernel file/process/object tool☆69Updated 4 years ago
- Beacon.dll reverse☆141Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆63Updated 4 years ago
- StenographyShellcodeLoader☆43Updated 5 years ago
- ☆37Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆100Updated 5 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- ☆74Updated 4 years ago
- ☆89Updated 3 years ago
- ☆52Updated 6 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 7 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆45Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Updated 4 years ago
- inject or convert shellcode to PE☆41Updated 6 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆194Updated 4 years ago
- ☆49Updated last month
- Shellcode injection POC using syscalls.☆117Updated 5 years ago
- Play Doh Windows ACL Tools☆64Updated 3 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 4 years ago
- bypass BeaconEye☆89Updated 4 years ago
- Another Go Shellcode Loader using Windows APIs☆141Updated 4 years ago
- ☆61Updated 3 years ago
- A simple hidden vnc.☆33Updated 4 years ago
- ☆81Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- ☆51Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago