p0dalirius / FindProcessesWithNamedPipes
A simple C++ Windows tool to get information about processes exposing named pipes.
☆37Updated last month
Alternatives and similar repositories for FindProcessesWithNamedPipes:
Users that are interested in FindProcessesWithNamedPipes are comparing it to the libraries listed below
- lsassdump via RtlCreateProcessReflection and NanoDump☆81Updated 6 months ago
- ☆55Updated 3 months ago
- ☆97Updated 7 months ago
- Execute dotnet app from unmanaged process☆73Updated 3 months ago
- remote process injections using pool party techniques☆58Updated 2 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆40Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- ☆30Updated last month
- Python3 rewrite of AsOutsider features of AADInternals☆44Updated 4 months ago
- ☆52Updated 4 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 10 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 2 months ago
- Sliver agent rewritten in C++☆45Updated 7 months ago
- Click Once + App Domain☆61Updated last year
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- ☆28Updated 10 months ago
- ☆61Updated 10 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- ☆40Updated 2 years ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago
- ☆98Updated last year
- converts sRDI compatible dlls to shellcode☆23Updated 3 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆36Updated last week
- ☆79Updated last year
- ☆26Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated 11 months ago
- ☆54Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago