matterpreter / FindETWProviderImageLinks
Quickly search for references to a GUID in DLLs, EXEs, and drivers
☆75Updated 3 years ago
Alternatives and similar repositories for FindETWProviderImage
Users that are interested in FindETWProviderImage are comparing it to the libraries listed below
Sorting:
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- ☆33Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- ☆48Updated 5 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- ☆45Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆106Updated 2 years ago
- ☆75Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- ☆55Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆37Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Updated 4 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Updated 4 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- pypykatz plugin for volatility3 framework☆44Updated 6 months ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆128Updated 4 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆60Updated 4 years ago