mgrube / recon_22
☆10Updated 2 years ago
Alternatives and similar repositories for recon_22:
Users that are interested in recon_22 are comparing it to the libraries listed below
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆18Updated last week
- ☆25Updated 2 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- ☆12Updated 2 years ago
- ☆18Updated last year
- ☆26Updated 3 months ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 9 months ago
- Slide of my conference presentations☆11Updated 4 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆25Updated last month
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A UEFI extraction tool☆15Updated 2 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- ☆25Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago