mtth-bfft / ntsecLinks
Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right assignments, enumerate attack surfaces from the point of view of a sandboxed process, etc.
☆33Updated 6 years ago
Alternatives and similar repositories for ntsec
Users that are interested in ntsec are comparing it to the libraries listed below
Sorting:
- Process reimaging proof of concept code☆97Updated 6 years ago
- Windows Drivers☆100Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- Driver Initial Reconnaissance Tool☆125Updated 6 years ago
- Simple 32/64-bit PEs loader.☆138Updated 7 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- Blog posts☆29Updated 5 years ago
- ☆51Updated 5 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Windows Console Monitoring☆103Updated 8 years ago
- a program to detect reflective dll injection on a live machine☆76Updated 10 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 9 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- A simple API monitor for Windbg☆65Updated 8 years ago
- ☆23Updated 4 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- ☆34Updated 8 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
- ☆46Updated 7 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- Reflective Polymorphism☆108Updated 7 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 5 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 3 years ago