malcomvetter / WMIProcessWatcherLinks
An example pattern in C# for using WMI to monitor process creation and termination events.
☆52Updated 6 years ago
Alternatives and similar repositories for WMIProcessWatcher
Users that are interested in WMIProcessWatcher are comparing it to the libraries listed below
Sorting:
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- Simple DLL injector written in C#☆24Updated 9 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- ☆41Updated 5 years ago
- ☆33Updated 5 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Managed wrappers around the Windows API and some Native API☆35Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆32Updated 7 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- ☆36Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last month
- Dump certificates from PE files in different formats☆38Updated last year
- ☆36Updated 3 years ago
- ☆33Updated 10 years ago
- A ready-made template for a project based on libpeconv.☆49Updated 4 months ago
- Loading a native DLL in the memory.☆69Updated 7 years ago
- Quick Proof of Concept for reading a processes memory and searching for a specific string.☆10Updated 6 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Updated 6 years ago
- Persistent through COM Hijacking☆21Updated 6 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆38Updated 2 years ago
- Injection of managed code into non-managed Windows applications☆28Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago