stavinski / winhookLinks
Go library to allow native inline hooking in windows at runtime
☆14Updated last year
Alternatives and similar repositories for winhook
Users that are interested in winhook are comparing it to the libraries listed below
Sorting:
- A shellcode runner / injector / hollower in Go, for windows☆25Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated 3 weeks ago
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 10 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆56Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Updated 3 years ago
- ☆18Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ADSI based SA tool☆17Updated 3 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Updated 4 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Updated 6 years ago
- pypykatz plugin for volatility3 framework☆45Updated 7 months ago
- BYOVD collection☆24Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated 2 years ago
- ☆12Updated 2 years ago
- ☆23Updated 3 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago