zodiacon / sysrunLinks
Run any executable as SYSTEM account (no service required)
☆139Updated last year
Alternatives and similar repositories for sysrun
Users that are interested in sysrun are comparing it to the libraries listed below
Sorting:
- Authenticode Hash Calculator for PE32/PE32+ files☆117Updated 4 months ago
- Explore Job Objects on a Windows system☆82Updated 6 years ago
- API Set Viewer☆90Updated 9 months ago
- Log ALPC activity☆84Updated 2 years ago
- Kernel Pool Monitor☆127Updated 3 years ago
- C++ library for low-level Windows development☆80Updated last year
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 4 years ago
- Trace events in real time sessions☆45Updated 2 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Updated 10 years ago
- Demo service that runs in svchost.exe☆79Updated 7 years ago
- Run executables in an AppContainer☆122Updated 6 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Updated 6 years ago
- View handles and object for each object type☆64Updated 6 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- Execute commands as local system.☆61Updated 6 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆84Updated 8 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆19Updated 2 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆100Updated 7 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- Miscellaneous Code and Docs☆84Updated 4 months ago
- Inject unsigned DLL into Protected Process Light (PPL)☆28Updated 6 months ago
- Collection of DLL function export forwards for DLL export function proxying☆105Updated 2 months ago
- Reflective PE loader for DLL injection☆183Updated 8 years ago
- ☆57Updated 11 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆69Updated 6 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆107Updated 9 months ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago