sensepost / pipetapLinks
A Windows Named Pipe Multi-tool / Proxy
☆240Updated last month
Alternatives and similar repositories for pipetap
Users that are interested in pipetap are comparing it to the libraries listed below
Sorting:
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- "Service-less" driver loading☆165Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆119Updated last year
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆148Updated last month
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆58Updated 3 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆123Updated last year
- ☆60Updated 8 months ago
- Generate a proxy dll for arbitrary dll☆219Updated last year
- Windows rootkit designed to work with BYOVD exploits☆211Updated last year
- Activation Context Hijack☆169Updated 5 months ago
- Payload encoding utility to effectively lower payload entropy.☆122Updated 9 months ago
- Admin to Kernel code execution using the KSecDD driver☆260Updated last year
- A collection of PoCs to do common things in unconventional ways☆122Updated 4 months ago
- Obex – Blocking unwanted DLLs in user mode☆279Updated 4 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆209Updated 4 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆357Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆220Updated 7 months ago
- Direct access to NTFS volumes☆292Updated 4 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- ☆108Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆89Updated 2 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆195Updated 7 months ago
- Injecting DLL into LSASS at boot☆156Updated 8 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆111Updated 2 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 3 months ago
- kernel-mode DLL Injector☆123Updated 8 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated 3 weeks ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆290Updated 2 months ago