rtfmkiesel / loldrivers-client
Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io
☆82Updated last year
Alternatives and similar repositories for loldrivers-client
Users that are interested in loldrivers-client are comparing it to the libraries listed below
Sorting:
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- Find DLLs with RWX section☆80Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 4 months ago
- ☆55Updated 6 months ago
- ☆59Updated last year
- ☆38Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- Identify and exploit leaked handles for local privilege escalation.☆107Updated last year
- ☆110Updated 5 months ago
- Source code and examples for PassiveAggression☆56Updated 11 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 8 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- Lifetime AMSI bypass.☆34Updated 3 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last week