zodiacon / sysrunLinks
Run any executable as SYSTEM account (no service required)
☆130Updated last year
Alternatives and similar repositories for sysrun
Users that are interested in sysrun are comparing it to the libraries listed below
Sorting:
- Log ALPC activity☆84Updated last year
- Authenticode Hash Calculator for PE32/PE32+ files☆111Updated last year
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆83Updated 7 years ago
- Process Doppelgänging☆157Updated 7 years ago
- Reflective PE loader for DLL injection☆175Updated 7 years ago
- Explore Job Objects on a Windows system☆83Updated 5 years ago
- API Set Viewer☆89Updated 4 months ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆87Updated 9 years ago
- C++ library for low-level Windows development☆74Updated last year
- An example of a client and server using Windows' ALPC functions to send and receive data.☆96Updated 4 months ago
- Demo service that runs in svchost.exe☆79Updated 7 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆143Updated 6 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Execute commands as local system.☆64Updated 5 years ago
- Yet another PE Viewer☆142Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆106Updated 5 years ago
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆175Updated last year
- View handles and object for each object type☆64Updated 5 years ago
- Shellcode to load an appended Dll☆88Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆139Updated 5 years ago
- ☆92Updated 4 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆104Updated 5 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 6 years ago
- Trace events in real time sessions☆45Updated last year
- Reverse engineered source code of the autochk rootkit☆202Updated 5 years ago
- Assembly block for hooking windows API functions.☆92Updated 5 years ago
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- Kernel Pool Monitor☆125Updated 3 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆143Updated 4 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago