tyranid / setsidmapping
Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.
☆23Updated 4 years ago
Alternatives and similar repositories for setsidmapping:
Users that are interested in setsidmapping are comparing it to the libraries listed below
- ☆17Updated 5 years ago
- ☆31Updated 4 years ago
- ☆24Updated 3 years ago
- ☆11Updated 5 years ago
- ☆21Updated 3 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- ☆18Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- Disable PPL via custom driver and dump lsass☆15Updated 4 years ago
- ☆15Updated last year
- Loads .NET Assembly Via CLR Loader☆16Updated 6 years ago
- A tool to create COM class/interface relationships in neo4j☆49Updated 2 years ago
- Run Managed Assemblies with RunDll☆17Updated 6 years ago
- ☆15Updated 5 years ago
- Files for http://deniable.org/windows/windows-callbacks☆25Updated 4 years ago
- ☆14Updated 5 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- ☆15Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆30Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- ☆32Updated 8 years ago
- My experience using Windows API for offensive purposes☆17Updated 3 years ago
- ☆16Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆26Updated 3 years ago