Process_Protection_Level_BOF

Process protection checker

A tool that helps operators determine the protection level of a process before attempting to access its memory

GitHub

51 stars
4 watching
8 forks
Language: C
last commit: about 3 years ago

Related projects:

Repository Description Stars
rasta-mouse/ppenum A tool to determine the protection level of a process using a simple Binary Object Formatter (BOF) approach. 104
espressocake/defender_exclusions-bof Tools to determine Windows Defender exclusions 239
espressocake/ppldump_bof A tool for dumping the memory contents of a protected process on Windows 135
espressocake/self_deletion_bof BOF implementation of a research concept allowing for controlled deletion of processes 169
espressocake/toggle_token_privileges_bof A tool to add or remove specific privilege rights from the token of the current process 52
espressocake/dll_imports_bof An enumeration tool to inspect PE files and extract information about loaded DLLs and their imported functions 83
espressocake/firewall_walker_bof An exploit technique allowing interaction with Windows software firewall via COM interfaces. 100
espressocake/dll-hijack-search-order-bof A tool to enumerate the search order of DLL resolution and potentially gain information about a file's mutability. 141
espressocake/needle_sift_bof A tool for searching for specific strings within files using a needle-sift algorithm 30
benjefferies/branch-protection-bot A tool to temporarily disable branch protection to allow administrator pushes 72
octoberfest7/killdefender_bof A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service 62
outflanknl/findobjects-bof An exploit tool that uses direct system calls to enumerate processes based on specific loaded modules or process handles 266
like0x/adddefenderexclusions-bof A tool to add exclusions to a security system's defender to prevent false positives or unwanted alerts 31
otterhacker/coffloader An implementation of in-house CoffLoader supporting CobaltStrike standard BOF and BSS initialized variables. 48
uniba-dsg/bpp Detects portability issues in BPEL code to ensure compatibility across different engines and environments. 4