OffensivePH
Process hijacker
A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
329 stars
13 watching
43 forks
Language: C
last commit: over 3 years ago driverinjectionioctlpost-exploitationppl
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that hijacks TCP connections by injecting packets into existing connections to intercept data | 480 |
| A tool to redirect network connections to alternative ports. | 42 |
| A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
| A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 |
| Analyzes running processes to detect and dump malicious code | 2,047 |
| A collection of Python scripts designed to simulate various phases of a cyber attack during a pen test or red team assessment. | 175 |
| An interactive process killer tool for Linux and macOS that allows users to filter and kill processes using keyboard navigation. | 316 |
| A tool demonstrating thread hijacking and code injection in Win32 applications. | 174 |
| A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| A tool that enhances characterization and research of processes on a host by providing a graphical overlay for the Cobalt Strike PS function. | 30 |
| A tool for injecting full dynamic executables into process images with thread injection | 128 |
| A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 543 |
| Converts packet capture files to usable hashes for Hashcat or John the Ripper analysis. | 2,039 |