whokilleddb / ETWListicleView external linksLinks
List the ETW provider(s) in the registration table of a process.
☆80Sep 20, 2023Updated 2 years ago
Alternatives and similar repositories for ETWListicle
Users that are interested in ETWListicle are comparing it to the libraries listed below
Sorting:
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Aug 21, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- ☆37Jan 7, 2025Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆366Apr 19, 2023Updated 2 years ago
- ☆100Oct 7, 2023Updated 2 years ago
- ☆126Sep 1, 2024Updated last year
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆408Jan 11, 2026Updated last month
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated last month
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- RPC to WebClient startup☆55Aug 19, 2025Updated 5 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆271Apr 17, 2023Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- ☆139Jan 16, 2025Updated last year
- Library of BOFs to interact with SQL servers☆222Dec 3, 2025Updated 2 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- ☆64May 31, 2024Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆144Mar 16, 2024Updated last year
- ☆83Aug 26, 2024Updated last year
- ☆118Nov 21, 2024Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Click Once + App Domain☆64Dec 4, 2023Updated 2 years ago
- A PoC .NET-specific process injection tool☆57Mar 17, 2024Updated last year
- ☆25Apr 28, 2024Updated last year
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Jun 21, 2025Updated 7 months ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆457Aug 2, 2024Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆44Feb 17, 2025Updated 11 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Abuse leaked token handles.☆134Dec 14, 2023Updated 2 years ago