p0dalirius / win32errorcodesLinks
A small C/C++ library to lookup Windows error codes.
☆21Updated last year
Alternatives and similar repositories for win32errorcodes
Users that are interested in win32errorcodes are comparing it to the libraries listed below
Sorting:
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆99Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 9 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆152Updated 3 weeks ago
- API Hammering with C++20☆49Updated 3 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- shell code example☆63Updated last month
- Shellcode loader☆96Updated last year
- ☆115Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- ☆136Updated 10 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆26Updated 3 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆116Updated last week
- Internal Monologue BOF☆79Updated 11 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆73Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- EvtPsst☆55Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- ☆61Updated 10 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆100Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆84Updated 7 months ago
- Mythic C2 Agent written in x64 PIC C☆84Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 7 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Updated 2 years ago