- SSD storage significantly decreases during Python runtime https://docs.microsoft.com/en-us/sysinternals/downloads/procmon 14 comments learnprogramming
Linking pages
- Extracting SSH Private Keys From Windows 10 ssh-agent - ropnop blog https://blog.ropnop.com/extracting-ssh-private-keys-from-windows-10-ssh-agent/ 116 comments
- Curated list of Windows utilities | orga.cat https://orga.cat/posts/windows-utilities 100 comments
- GitHub - beerisgood/Windows11_Hardening: A collection about Windows 11 security https://github.com/beerisgood/Windows11_Hardening 50 comments
- GitHub - 0PandaDEV/awesome-windows: An awesome & curated list of tools and apps for Windows 10/11. https://github.com/0PandaDEV/awesome-windows 37 comments
- DLL Hijacking | liberty shell https://liberty-shell.com/sec/2019/03/12/dll-hijacking/ 29 comments
- 🇬🇧 Stealing weapons from the Armoury | APT::WTF - APTortellini’s blog https://aptw.tf/2021/09/24/armoury-crate-privesc.html 29 comments
- GitHub - Awesome-Windows/Awesome: 🎉 An awesome & curated list of best applications and tools for Windows. https://github.com/Awesome-Windows/Awesome 19 comments
- Windows DLL Proxying/Hijacking – Dev Blog https://cihansol.com/blog/index.php/2021/09/14/windows-dll-proxying-hijacking/ 9 comments
- BMC Patrol Agent – Domain User to Domain Admin – Part 2 – Securifera https://www.securifera.com/blog/2021/03/08/bmc-patrol-agent-domain-user-to-domain-admin-part-2/ 9 comments
- How to Fix High CPU Usage - Intel https://www.intel.com/content/www/us/en/gaming/resources/how-to-fix-high-cpu-usage.html 9 comments
- DLL Hijacking for Code Execution - Cra0 - Software Engineer https://cra0.net/blog/posts/dll-hijacking-for-code-execution/ 7 comments
- Bypassing LSA Protection in Userland – Sec Team Blog https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/ 6 comments
- Hijacking DLLs in Windows https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows 6 comments
- NVIDIA Arbitrary File Writes to Command Execution | CVE-2019-5674 - Rhino Security Labs https://rhinosecuritylabs.com/application-security/nvidia-arbitrary-file-writes-to-command-execution-cve-2019-5674/ 6 comments
- Windows Drivers Reverse Engineering Methodology - VoidSec https://voidsec.com/windows-drivers-reverse-engineering-methodology/ 5 comments
- Sinter: New user-mode security enforcement for macOS | Trail of Bits Blog https://blog.trailofbits.com/2020/08/12/sinter-new-user-mode-security-enforcement-for-macos/ 4 comments
- Save the Environment (Variable) https://www.wietzebeukema.nl/blog/save-the-environment-variables 2 comments
- Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus | by Chris Lyne | Tenable TechBlog | Medium https://medium.com/tenable-techblog/stored-xss-to-rce-chain-as-system-in-manageengine-servicedesk-plus-493c10f3e444 2 comments
- Mystery Knowledge and Useful Tools - Nikhil's blog https://nikhilism.com/post/2020/mystery-knowledge-useful-tools/ 2 comments
- Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1 https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1 1 comment
Related searches:
Search whole site: site:docs.microsoft.com
Search title: Process Monitor - Sysinternals | Microsoft Learn
See how to search.