DarkSpaceSecurity / RunAs-StealerLinks
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
☆203Updated 11 months ago
Alternatives and similar repositories for RunAs-Stealer
Users that are interested in RunAs-Stealer are comparing it to the libraries listed below
Sorting:
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Our Tips&Tricks☆128Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- Stage 0☆169Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- The different ways to dump lsass☆261Updated 5 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆207Updated 2 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆149Updated 7 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆282Updated 4 months ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆83Updated last month
- Adversary Emulation Framework☆129Updated 7 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Updated 10 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- ☆163Updated 2 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Updated this week
- Analyse MSI files for vulnerabilities☆143Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆270Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago