Dangling COM Keys Finder
☆17Nov 16, 2021Updated 4 years ago
Alternatives and similar repositories for DCKFinder
Users that are interested in DCKFinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Dec 29, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- ☆93Aug 23, 2021Updated 4 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Example for PagedOut!☆26Oct 22, 2019Updated 6 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆263Apr 29, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- ☆94May 14, 2022Updated 3 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Detect strange memory regions and DLLs☆190Jan 20, 2022Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆111Dec 28, 2021Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago
- ☆63May 31, 2024Updated last year
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- ☆82Feb 12, 2022Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- ☆26Apr 10, 2023Updated 2 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- Run python from a single exe☆36May 1, 2022Updated 3 years ago
- ☆14Apr 16, 2022Updated 3 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- ☆142May 4, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago