warpnet / COM-FuzzerLinks
Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully identify interesting (D)COM classes/implementations in such a time that would take a manual approach significantly more.
☆156Updated 2 months ago
Alternatives and similar repositories for COM-Fuzzer
Users that are interested in COM-Fuzzer are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- ☆108Updated last year
- Commandline spoofing on Windows☆92Updated 2 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- ☆159Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- Shellcode loader☆100Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆67Updated 2 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- Linker for Beacon Object Files☆147Updated last week
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆135Updated 10 months ago
- A collection of position independent coding resources☆107Updated 2 months ago
- ForsHops☆59Updated 10 months ago
- shell code example☆67Updated last month
- ☆118Updated last year
- A small How-To on creating your own weaponized WSL file☆119Updated 6 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Updated last month
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆222Updated 3 months ago
- ☆100Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated 3 weeks ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆119Updated last month
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 5 months ago
- Internal Monologue BOF☆79Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆136Updated 7 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆63Updated 10 months ago