OffensivePH
Process hijacker
A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
329 stars
13 watching
43 forks
Language: C
last commit: over 3 years ago driverinjectionioctlpost-exploitationppl
Related projects:
Repository | Description | Stars |
---|---|---|
kpcyrd/rshijack | A tool that hijacks TCP connections by injecting packets into existing connections to intercept data | 480 |
filosottile/otherport | A tool to redirect network connections to alternative ports. | 42 |
netero1010/rdphijack-bof | A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
matterpreter/offensivecsharp | A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 |
hasherezade/hollows_hunter | Analyzes running processes to detect and dump malicious code | 2,047 |
redsiege/aggressorassessor | A collection of Python scripts designed to simulate various phases of a cyber attack during a pen test or red team assessment. | 175 |
heppu/gkill | An interactive process killer tool for Linux and macOS that allows users to filter and kill processes using keyboard navigation. | 316 |
josh0xa/threadfire | A tool demonstrating thread hijacking and code injection in Win32 applications. | 174 |
octoberfest7/kdstab | A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
joshfaust/alaris | A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
icebearfriend/quickrundown | A tool that enhances characterization and research of processes on a host by providing a graphical overlay for the Cobalt Strike PS function. | 30 |
elfmaster/saruman | A tool for injecting full dynamic executables into process images with thread injection | 128 |
d4rk007/redghost | A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 543 |
zerbea/hcxtools | Converts packet capture files to usable hashes for Hashcat or John the Ripper analysis. | 2,039 |