kphongagsorn / windows-undocumented-apisLinks
Projects on undocumented windows APIs, a keylogger PoC, and dll injection PoC. Based off of a Defcon workshop
☆36Updated 7 years ago
Alternatives and similar repositories for windows-undocumented-apis
Users that are interested in windows-undocumented-apis are comparing it to the libraries listed below
Sorting:
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 6 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- A simple POC to demonstrate the power of .NET debugging for injection☆73Updated 5 years ago
- A set of small utilities, helpers for PIN tracers☆34Updated 3 weeks ago
- A ready-made template for a project based on libpeconv.☆50Updated 8 months ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- A simple API monitor for Windbg☆64Updated 8 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- A program that generates code to implement a DLL Proxy.☆70Updated 8 years ago
- ☆46Updated 7 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 5 years ago
- ☆22Updated 5 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Exploits I've authored☆60Updated 6 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- ☆37Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆29Updated 7 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 8 years ago
- C++ DLL Bootstrapper for spinning up the CLR for C# Payloads☆44Updated 6 years ago