p0dalirius / microsoft-rpc-fuzzing-toolsLinks
 This repository contains a list of python scripts to work with Microsoft RPC for research purposes. 
☆50Updated 8 months ago
Alternatives and similar repositories for microsoft-rpc-fuzzing-tools
Users that are interested in microsoft-rpc-fuzzing-tools are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- ☆81Updated last year
- ☆27Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 7 months ago
- ☆88Updated 3 years ago
- ☆72Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆110Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆97Updated 2 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated 7 months ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- ☆63Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- ☆71Updated 3 years ago
- BYOVD collection☆23Updated last year
- ☆28Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆132Updated 2 years ago
- some sploits☆18Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆89Updated 3 years ago
- ☆80Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- ☆24Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- .NET project for installing Persistence☆63Updated 3 years ago