OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.
☆21Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for Win11-OneDrive-DLL-injection-vulnerability
Users that are interested in Win11-OneDrive-DLL-injection-vulnerability are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- ☆55May 31, 2025Updated 9 months ago
- ☆39Sep 25, 2023Updated 2 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- ☆27May 1, 2023Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- ☆36Feb 1, 2026Updated last month
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆28Mar 21, 2023Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆11May 22, 2022Updated 3 years ago
- ☆33Mar 19, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆42Feb 6, 2026Updated last month
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- ☆48Dec 5, 2025Updated 3 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago