ServiceMove-BOF
DLL Hijacker
A tool that exploits a Windows vulnerability to execute arbitrary code on remote systems using a technique called DLL hijacking.
New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
284 stars
6 watching
46 forks
Language: C
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
| A tool to enumerate the search order of DLL resolution and potentially gain information about a file's mutability. | 141 |
| A tool for injecting malware into processes by mapping it to memory without registering it with the kernel. | 147 |
| Tools to detect DLL hijacking vulnerabilities in executable files | 767 |
| A tool to redirect network connections to alternative ports. | 42 |
| A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service | 62 |
| An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique | 157 |
| A tool for detecting DLL hijacking vulnerabilities in binaries. | 70 |
| An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 |
| A tool to help identify DLL sideloading on Windows systems. | 23 |
| Provides tools and primitives for interacting with Microsoft Windows systems remotely. | 892 |
| A DLL loader with advanced evasion techniques to bypass user-land hooks and load malicious payloads. | 676 |
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |