tijldeneut / DPAPIck3
☆17Updated last year
Alternatives and similar repositories for DPAPIck3
Users that are interested in DPAPIck3 are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆47Updated 4 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 2 weeks ago
- Repo containing my public talks☆23Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆41Updated last year
- quASAR: ASAR manipulation made easy☆37Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- ☆19Updated 2 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆62Updated 4 months ago
- ☆30Updated 5 months ago
- ☆48Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- Diana Credential Recovery Framework☆56Updated 2 months ago
- Research into COM☆19Updated 5 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- ☆23Updated last year
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- Ghosting-AMSI☆17Updated 2 weeks ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- List the ETW provider(s) in the registration table of a process.☆59Updated last year
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Updated 3 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 2 months ago
- Bitpixie exploitation PoC☆29Updated last month
- Registry hive parsing the async way☆21Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year