mtth-bfft / ntsecLinks
Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right assignments, enumerate attack surfaces from the point of view of a sandboxed process, etc.
☆33Updated 6 years ago
Alternatives and similar repositories for ntsec
Users that are interested in ntsec are comparing it to the libraries listed below
Sorting:
- Process reimaging proof of concept code☆97Updated 6 years ago
 - Blog posts☆29Updated 5 years ago
 - Windows Drivers☆98Updated 6 years ago
 - PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
 - ☆50Updated 5 years ago
 - A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆98Updated 4 years ago
 - Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
 - A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
 - DLL Injection Library & Tools☆72Updated 9 years ago
 - CAPE monitor DLLs☆41Updated 5 years ago
 - Sysmon shenanigans☆66Updated 5 years ago
 - Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 5 years ago
 - Reflective Polymorphism☆107Updated 7 years ago
 - Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
 - a program to detect reflective dll injection on a live machine☆76Updated 9 years ago
 - ☆34Updated 8 years ago
 - Kernel mode windows NT API logger☆22Updated 6 years ago
 - Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
 - DotNext 2019 St. Petersburg Talk Demos☆39Updated 6 years ago
 - PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
 - ☆46Updated 7 years ago
 - A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆100Updated 7 years ago
 - C++☆80Updated 9 years ago
 - A simple API monitor for Windbg☆64Updated 8 years ago
 - The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆149Updated 5 years ago
 - The exploit for Panda AV LPE☆37Updated 6 years ago
 - Windows Console Monitoring☆101Updated 8 years ago
 - Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
 - Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
 - Evil Reflective DLL Injection Finder☆47Updated 6 years ago