Dump processes over WMI with MSFT_MTProcess
☆85Feb 13, 2026Updated last month
Alternatives and similar repositories for WMI_Proc_Dump
Users that are interested in WMI_Proc_Dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Awesome MalDev Links☆52Mar 18, 2026Updated last week
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆42Feb 6, 2026Updated last month
- ☆139Nov 17, 2025Updated 4 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆289Jan 12, 2026Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- ForsHops☆153Mar 25, 2025Updated last year
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆50Jun 4, 2025Updated 9 months ago
- ☆126Sep 1, 2024Updated last year
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆658Jan 16, 2026Updated 2 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆43Dec 30, 2025Updated 2 months ago
- ☆16Dec 7, 2025Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- ☆33Jan 23, 2025Updated last year
- Python based GUI for browsing LDAP☆182Dec 7, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆119Oct 6, 2025Updated 5 months ago
- ☆100Sep 1, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 3 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆169Jul 31, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆169Sep 22, 2025Updated 6 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month