zblurx / impersonate-rs
Rusty Impersonate
☆94Updated last year
Related projects ⓘ
Alternatives and complementary repositories for impersonate-rs
- Simple BOF to read the protection level of a process☆104Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- ☆83Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆113Updated 4 months ago
- ☆61Updated 2 years ago
- Lateral Movement via the .NET Profiler☆76Updated this week
- Implant drop-in for EDR testing☆128Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 5 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- Find DLLs with RWX section☆75Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆59Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆113Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- ☆66Updated 3 months ago
- ☆73Updated last year
- ☆92Updated 9 months ago
- Python module for running BOFs☆64Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆57Updated 5 months ago
- Host CLR and run .NET binaries using Rust☆61Updated 3 weeks ago
- ☆119Updated last year
- ☆96Updated last year
- Tool for playing with Windows Access Token manipulation.☆52Updated last year
- Detect EDR's exceptions by inspecting processes' loaded modules☆123Updated 8 months ago
- ☆116Updated 2 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- ☆138Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- ☆104Updated this week
- ☆133Updated last year