thiagopeixoto / winsos-pocLinks
A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
☆112Updated last year
Alternatives and similar repositories for winsos-poc
Users that are interested in winsos-poc are comparing it to the libraries listed below
Sorting:
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆93Updated last month
- ☆61Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago
- Windows AppLocker Driver (appid.sys) LPE☆65Updated last year
- ☆100Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆80Updated 4 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- Create Anti-Copy DRM Malware☆65Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 6 months ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆62Updated 3 weeks ago
- ☆93Updated last year
- TypeLib persistence technique☆133Updated 10 months ago
- ☆78Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- Plantronics Desktop Hub LPE☆36Updated last year
- shell code example☆62Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆81Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 8 months ago
- ☆87Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year