vallejocc / PoC-Inject-Data-WM_COPYDATAView external linksLinks
A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext
☆53Apr 29, 2018Updated 7 years ago
Alternatives and similar repositories for PoC-Inject-Data-WM_COPYDATA
Users that are interested in PoC-Inject-Data-WM_COPYDATA are comparing it to the libraries listed below
Sorting:
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Apr 25, 2018Updated 7 years ago
- ☆22May 25, 2017Updated 8 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 6 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- ☆164May 18, 2018Updated 7 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- Team Portfolio. PLAYERUNKNOWN'S BATTLEGROUNDS(a.k.a. PUBG) Imitation Game's Proto Type.☆16Aug 12, 2018Updated 7 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- ☆24Jul 24, 2020Updated 5 years ago
- ☆142Apr 21, 2017Updated 8 years ago