Dump processes over WMI with MSFT_MTProcess
☆85Feb 13, 2026Updated 2 months ago
Alternatives and similar repositories for WMI_Proc_Dump
Users that are interested in WMI_Proc_Dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Awesome MalDev Links☆57Mar 18, 2026Updated 3 weeks ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆69Jan 13, 2026Updated 3 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- ☆138Nov 17, 2025Updated 4 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆291Mar 29, 2026Updated 2 weeks ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆303Mar 28, 2026Updated 2 weeks ago
- ☆17Jan 9, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- ForsHops☆154Mar 25, 2025Updated last year
- Dump Kerberos tickets☆46Aug 4, 2025Updated 8 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆50Jun 4, 2025Updated 10 months ago
- ☆127Sep 1, 2024Updated last year
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 4 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆47Apr 1, 2026Updated 2 weeks ago
- ☆16Dec 7, 2025Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- ☆35Jan 23, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 4 months ago
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago
- ☆100Sep 1, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆126Jan 29, 2026Updated 2 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Dec 4, 2025Updated 4 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆168Sep 22, 2025Updated 6 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Updated this week
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 3 months ago