DarkSpaceSecurity / RunAs-StealerLinks
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
☆203Updated 8 months ago
Alternatives and similar repositories for RunAs-Stealer
Users that are interested in RunAs-Stealer are comparing it to the libraries listed below
Sorting:
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- Our Tips&Tricks☆127Updated 8 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆253Updated last month
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆151Updated 3 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- Stage 0☆164Updated 10 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆300Updated this week
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- ☆164Updated 8 months ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆265Updated last year
- Enumerate active EDR's on the system☆144Updated last month
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆129Updated 10 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- Ghosting-AMSI☆220Updated 6 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆236Updated last week
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 7 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- The different ways to dump lsass☆195Updated 3 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 6 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆213Updated 2 weeks ago