DLL-Hijack-Search-Order-BOF
DLL Search Enumerator
A tool to enumerate the search order of DLL resolution and potentially gain information about a file's mutability.
DLL Hijack Search Order Enumeration BOF
141 stars
3 watching
20 forks
Language: C
last commit: almost 4 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An enumeration tool to inspect PE files and extract information about loaded DLLs and their imported functions | 83 |
| | A tool for searching for specific strings within files using a needle-sift algorithm | 30 |
| | A tool that exploits a Windows vulnerability to execute arbitrary code on remote systems using a technique called DLL hijacking. | 284 |
| | BOF implementation of a research concept allowing for controlled deletion of processes | 171 |
| | A tool that helps operators determine the protection level of a process before attempting to access its memory | 51 |
| | Tools to determine Windows Defender exclusions | 241 |
| | A tool for dumping the memory contents of a protected process on Windows | 136 |
| | A Go-based tool for concurrent HTTP enumeration of directories and files using a wordlist. | 269 |
| | An exploit tool that uses direct system calls to enumerate processes based on specific loaded modules or process handles | 266 |
| | A tool to add or remove specific privilege rights from the token of the current process | 52 |
| | An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 |
| | A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| | Tools to detect DLL hijacking vulnerabilities in executable files | 767 |
| | Utility for efficient bulk loading of data into an Elasticsearch index | 281 |
| | A Python-based tool for enumerating information from Windows and Samba systems | 1,210 |