rsmudge / vncdllLinks
Stand-alone VNC server compiled as a Reflective DLL
☆198Updated 6 years ago
Alternatives and similar repositories for vncdll
Users that are interested in vncdll are comparing it to the libraries listed below
Sorting:
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 7 years ago
- Used to create wrappers and proxy libraries for Windows binaries.☆76Updated 14 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Updated 8 years ago
- Steal privileged token to obtain SYSTEM shell☆252Updated 5 years ago
- Convert PE files to a shellcode☆80Updated 5 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆152Updated 6 years ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Updated last year
- X86 version of syswhispers2 / x86 direct system call☆329Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Updated 8 years ago
- The VBScript Obfuscator written in VBScript☆117Updated 4 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆88Updated 4 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆259Updated 5 months ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆152Updated 5 years ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 6 years ago
- Small tool to load shellcodes or PEs to analyze them☆83Updated 7 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆117Updated 6 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Updated 5 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆227Updated 8 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Updated 4 years ago
- Shellcode injection POC using syscalls.☆117Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 4 years ago
- ☆155Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 6 months ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆37Updated 6 years ago
- Use CLR to inject all the .NET apps☆183Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Updated 6 years ago