rsmudge / vncdllLinks
Stand-alone VNC server compiled as a Reflective DLL
☆192Updated 6 years ago
Alternatives and similar repositories for vncdll
Users that are interested in vncdll are comparing it to the libraries listed below
Sorting:
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆68Updated 6 years ago
- Steal privileged token to obtain SYSTEM shell☆250Updated 4 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆239Updated 5 months ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- The VBScript Obfuscator written in VBScript☆115Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆229Updated last year
- Used to create wrappers and proxy libraries for Windows binaries.☆76Updated 13 years ago
- X86 version of syswhispers2 / x86 direct system call☆325Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 7 years ago
- Example DLL to load from Windows NetShell☆180Updated 8 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆221Updated 7 years ago
- ☆209Updated 5 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 7 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆115Updated 5 years ago
- Convert PE files to a shellcode☆78Updated 5 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- Penetration test☆55Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- Use CLR to inject all the .NET apps☆184Updated 4 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆150Updated 5 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆87Updated 4 years ago
- ☆151Updated 4 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆153Updated 4 years ago
- dem sharp donuts☆199Updated 2 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Updated 5 years ago
- bypass uac☆143Updated 7 years ago
- Universal Unhooking☆321Updated 6 years ago
- Windows UAC bypass techniques implemented and written in Go☆212Updated 3 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆258Updated 4 years ago
- exe2powershell - exe2bat reborn for modern Windows☆171Updated 4 years ago