|
Up
|
|
|
|
|
2011-01-25 - No Loitering - Exploiting Lingering Vulnerabilities in Default COM Objects.pdf
|
|
|
|
|
2014-12-03 - Hooking COM Objects - Intercepting Calls to COM Interfaces.7z
|
|
|
|
|
2016-01-12 - Creating Processes By Using Undocumented COM APIs.7z
|
|
|
|
|
2018-03-17 - Abusing Exported Functions and Exposed DCOM Interfaces.pdf
|
|
|
|
|
2018-09-09 - Finding Interactive User COM Objects using PowerShell.pdf
|
|
|
|
|
2021-05-01 - Symantec Endpoint Protection Meets COM - Using Symantec.SSHelper As A LOLBIN.pdf
|
|
|
|
|
2021-05-12 - Breaking the WDAPT Rules with COM.pdf
|
|
|
|
|
2021-10-21 - Windows Exploitation Tricks - Relaying DCOM Authentication.pdf
|
|
|
|
|
2022-01-12 - Playing Around COM Objects Part 1 - DllGetClassObject and ShellExecute IDispatch for Process creation.pdf
|
|
|
|
|
2022-10-28 - Using Windows IUIAutomation for spyware and other malicious purposes.html
|
|
|
|
|
2023-06-18 - DCOMHijack - Demonstrating lateral movement using DCOM and DLL hijacking.zip
|
|
|
|
|
2024-10-09 - XBL Live Game Save DCOM for lateral movement.zip
|
|
|
|