ricardojoserf / NativeTokenImpersonateLinks
Impersonate Tokens using only NTAPI functions
☆75Updated 2 months ago
Alternatives and similar repositories for NativeTokenImpersonate
Users that are interested in NativeTokenImpersonate are comparing it to the libraries listed below
Sorting:
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆98Updated 2 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆93Updated last month
- A collection of position independent coding resources☆79Updated 4 months ago
- ☆110Updated 5 months ago
- ForsHops☆139Updated 2 months ago
- ☆113Updated 5 months ago
- ☆97Updated 9 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.