rsmudge / vncdllLinks
Stand-alone VNC server compiled as a Reflective DLL
☆195Updated 6 years ago
Alternatives and similar repositories for vncdll
Users that are interested in vncdll are comparing it to the libraries listed below
Sorting:
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago
- Steal privileged token to obtain SYSTEM shell☆251Updated 5 years ago
- Used to create wrappers and proxy libraries for Windows binaries.☆76Updated 13 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Convert PE files to a shellcode☆79Updated 5 years ago
- X86 version of syswhispers2 / x86 direct system call☆326Updated 4 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- The VBScript Obfuscator written in VBScript☆116Updated 3 years ago
- Small tool to load shellcodes or PEs to analyze them☆83Updated 7 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆246Updated last month
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆150Updated 6 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆231Updated last year
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆224Updated 7 years ago
- Shellcode injection POC using syscalls.☆116Updated 5 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆191Updated 4 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆154Updated 5 years ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- Penetration test☆55Updated 4 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆87Updated 4 years ago
- Beacon.dll reverse☆141Updated 4 years ago
- ☆209Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆114Updated 5 years ago
- Example DLL to load from Windows NetShell☆182Updated 8 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆155Updated 5 years ago
- dll proxying☆60Updated 4 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- Windows UAC bypass techniques implemented and written in Go☆213Updated 3 years ago