w1u0u1 / kt
Kernel file/process/object tool
☆64Updated 3 years ago
Alternatives and similar repositories for kt:
Users that are interested in kt are comparing it to the libraries listed below
- bypass BeaconEye☆88Updated 3 years ago
- ☆51Updated 5 years ago
- ☆75Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆97Updated 4 years ago
- ☆35Updated 4 years ago
- ☆36Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- ☆50Updated 4 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- ☆36Updated 4 years ago
- UAC_wenpon☆48Updated 3 years ago
- ☆40Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 2 months ago
- ☆80Updated 3 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- ☆32Updated 4 years ago
- Play Doh Windows ACL Tools☆61Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆58Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- x64 version☆30Updated 3 years ago
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 3 years ago
- ☆88Updated 2 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 5 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago