DLL-Hijack-Search-Order-BOF
DLL Search Enumerator
A tool to enumerate the search order of DLL resolution and potentially gain information about a file's mutability.
DLL Hijack Search Order Enumeration BOF
141 stars
3 watching
20 forks
Language: C
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An enumeration tool to inspect PE files and extract information about loaded DLLs and their imported functions | 83 |
| A tool for searching for specific strings within files using a needle-sift algorithm | 30 |
| A tool that exploits a Windows vulnerability to execute arbitrary code on remote systems using a technique called DLL hijacking. | 284 |
| BOF implementation of a research concept allowing for controlled deletion of processes | 171 |
| A tool that helps operators determine the protection level of a process before attempting to access its memory | 51 |
| Tools to determine Windows Defender exclusions | 241 |
| A tool for dumping the memory contents of a protected process on Windows | 136 |
| A Go-based tool for concurrent HTTP enumeration of directories and files using a wordlist. | 269 |
| An exploit tool that uses direct system calls to enumerate processes based on specific loaded modules or process handles | 266 |
| A tool to add or remove specific privilege rights from the token of the current process | 52 |
| An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| Tools to detect DLL hijacking vulnerabilities in executable files | 767 |
| Utility for efficient bulk loading of data into an Elasticsearch index | 281 |
| A Python-based tool for enumerating information from Windows and Samba systems | 1,210 |