sensepost / pipetapLinks
A Windows Named Pipe Multi-tool / Proxy
☆76Updated this week
Alternatives and similar repositories for pipetap
Users that are interested in pipetap are comparing it to the libraries listed below
Sorting:
- "Service-less" driver loading☆165Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆153Updated 3 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆121Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated 5 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆73Updated 5 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆72Updated 7 months ago
- Mentally ill EtwTi parser☆67Updated last month
- ☆61Updated 7 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆54Updated last year
- Activation Context Hijack☆169Updated 4 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- Payload encoding utility to effectively lower payload entropy.☆119Updated 7 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆129Updated last week
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆132Updated 3 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆58Updated 2 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆91Updated 5 months ago
- A collection of PoCs to do common things in unconventional ways☆118Updated 3 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆123Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- shell code example☆63Updated last month
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆114Updated 10 months ago
- ☆108Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆200Updated 3 months ago
- ☆52Updated 4 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆135Updated last year
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆97Updated last week
- A universal binary patching dll.☆111Updated last year
- Admin to Kernel code execution using the KSecDD driver☆260Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆75Updated last year