patrickmatula / Windows-Internals-Learning-Resources
☆96Updated 2 months ago
Alternatives and similar repositories for Windows-Internals-Learning-Resources:
Users that are interested in Windows-Internals-Learning-Resources are comparing it to the libraries listed below
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 7 months ago
- ☆103Updated 3 months ago
- ☆154Updated 9 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆99Updated 5 months ago
- PowerShell PE Parser☆61Updated 7 months ago
- Analyse MSI files for vulnerabilities☆124Updated 5 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- "Service-less" driver loading☆149Updated 2 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆132Updated last year
- ☆136Updated 3 months ago
- Windows rootkit designed to work with BYOVD exploits☆160Updated last month
- ☆112Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆216Updated 2 months ago
- ☆111Updated 2 months ago
- Tools for analyzing EDR agents☆219Updated 8 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- ☆142Updated 2 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- Collect Windows telemetry for Maldev☆297Updated last week
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 10 months ago
- early cascade injection PoC based on Outflanks blog post☆203Updated 3 months ago
- Recon 2023 slides and code☆79Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆242Updated last year
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- ☆105Updated 7 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆321Updated 6 months ago
- ☆63Updated 2 weeks ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆131Updated 8 months ago
- Admin to Kernel code execution using the KSecDD driver☆243Updated 10 months ago
- ☆49Updated 4 months ago