warpnet / COM-FuzzerLinks
Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully identify interesting (D)COM classes/implementations in such a time that would take a manual approach significantly more.
☆154Updated 3 weeks ago
Alternatives and similar repositories for COM-Fuzzer
Users that are interested in COM-Fuzzer are comparing it to the libraries listed below
Sorting:
- Commandline spoofing on Windows☆82Updated 3 weeks ago
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- ☆108Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- ForsHops☆59Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Linker for Beacon Object Files☆134Updated 3 weeks ago
- ☆98Updated last year
- ☆54Updated 6 months ago
- Shellcode loader☆97Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 4 months ago
- Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictabili…☆99Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆94Updated last week
- ☆86Updated 10 months ago
- Internal Monologue BOF☆78Updated 11 months ago
- shell code example☆65Updated last week
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆132Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- ☆159Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆116Updated 2 weeks ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- A collection of position independent coding resources☆101Updated last month
- Bypass user-land hooks by syscall tampering via the Trap Flag☆135Updated 3 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆114Updated 11 months ago
- Fairy Law - Compromise or disable EDR security solutions☆52Updated 2 weeks ago
- A hoontr must hoont☆102Updated 3 weeks ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago