0xRobert / mimikatz-rsLinks
Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)
☆18Updated 2 years ago
Alternatives and similar repositories for mimikatz-rs
Users that are interested in mimikatz-rs are comparing it to the libraries listed below
Sorting:
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Updated last year
- Self Cleanup in post-ex job☆59Updated last year
- Rust 重构的 sRDI☆14Updated last year
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- kill AV/EDR☆22Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- HVNC based on RustDesk☆94Updated last year
- ☆42Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- ☆57Updated last year
- Kill Everything AV/EDR☆27Updated 10 months ago
- 一个普通的BOF用来BypassUAC☆22Updated last year
- Shellcode Reductio Entropy Tools☆73Updated last year
- Help red teams find opsec processes during engagements☆42Updated 9 months ago
- load assembly executable file in memory☆41Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆55Updated last year
- 一个demo☆24Updated last year
- Beacon compiled using clang☆71Updated 2 years ago
- DNS Tunneling as net.Conn☆16Updated 9 months ago
- 内存分析中玩贪吃蛇☆16Updated last year
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆49Updated last year
- Evasive loader to bypass static detection☆59Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- AddDefenderExclusions Beacon Object File☆40Updated 2 years ago
- ☆80Updated 3 years ago