secana / CertDump
Dump certificates from PE files in different formats
☆38Updated last year
Alternatives and similar repositories for CertDump:
Users that are interested in CertDump are comparing it to the libraries listed below
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆20Updated 3 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆36Updated last year
- A ready-made template for a project based on libpeconv.☆43Updated 3 months ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆17Updated last year
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- ☆27Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆45Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆35Updated 4 years ago
- A simple PE loader.☆25Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 7 months ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- Code samples that serve as references for Windows API functions☆27Updated 8 months ago
- The evolution of NxRansomware☆10Updated 5 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆14Updated 4 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆33Updated last month
- Hide code from dnSpy and other C# spying tools☆41Updated 4 years ago
- INF Studio for easier working with driver installation files☆36Updated last year
- Example of building an application verifer DLL☆44Updated 8 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Manually perform syscalls without going through any external API or DLL.☆17Updated last year
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆40Updated 5 years ago
- ☆15Updated 4 years ago
- ☆17Updated 5 years ago