DarkSpaceSecurity / RunAs-StealerLinks
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
☆203Updated 11 months ago
Alternatives and similar repositories for RunAs-Stealer
Users that are interested in RunAs-Stealer are comparing it to the libraries listed below
Sorting:
- Our Tips&Tricks☆128Updated 11 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆149Updated 7 months ago
- The different ways to dump lsass☆261Updated 5 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆206Updated 2 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆282Updated 4 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- RunPE implementation with multiple evasive techniques (2)☆269Updated 4 months ago
- Stage 0☆169Updated last year
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- Analyse MSI files for vulnerabilities☆143Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Updated this week
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Updated 10 months ago
- Amazing whoami alternatives☆141Updated last year
- ☆163Updated 2 years ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆270Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- Shellcode injection using the Windows Debugging API☆165Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago
- Ghosting-AMSI☆220Updated 9 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆216Updated 3 months ago