Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session
☆18Jun 6, 2019Updated 6 years ago
Alternatives and similar repositories for ExecAs
Users that are interested in ExecAs are comparing it to the libraries listed below
Sorting:
- Simple VM-based scripting language☆13Feb 25, 2020Updated 6 years ago
- Suite of classes for Windows programming☆18Apr 13, 2016Updated 9 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- Unofficial mirror☆35Aug 15, 2019Updated 6 years ago
- "Positive☆Desktop" is reworked virtual desktop utility for Windows 10 & 11.☆10Nov 20, 2023Updated 2 years ago
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆12May 22, 2018Updated 7 years ago
- A tool for mirroring a virtual screen to a window. Useful for using a mobile device as an external screen.☆11Jan 22, 2015Updated 11 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- ☆14Feb 23, 2018Updated 8 years ago
- CreateProcessAsUser example☆12Dec 30, 2014Updated 11 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Windows sandbox PoC☆32May 25, 2020Updated 5 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆28Nov 5, 2020Updated 5 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- .net based packer/obfuscator with apc based pe injection☆15Mar 23, 2016Updated 9 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- A simple program to scan for open handles in a process.☆61Dec 29, 2016Updated 9 years ago
- ☆15Mar 8, 2017Updated 8 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Team Portfolio. PLAYERUNKNOWN'S BATTLEGROUNDS(a.k.a. PUBG) Imitation Game's Proto Type.☆16Aug 12, 2018Updated 7 years ago
- drivesploit-testing☆26Jul 28, 2010Updated 15 years ago
- 使用VS2017编译Nginx,方便调测☆16Mar 4, 2018Updated 8 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- A collection of Windows Administrator tools☆18Jan 1, 2014Updated 12 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- Fast NTFS Directory Scan and Search☆16Nov 29, 2020Updated 5 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- ATL Server Library and Tools (Cloned from CodePlex before it was shutdown).☆21Apr 13, 2017Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago