I3IT / Detect.Remote.ShadowSnapshot.Dump
Detect Remote Local Credentials Dumping using a Shadow Snapshot
☆21Updated last month
Alternatives and similar repositories for Detect.Remote.ShadowSnapshot.Dump:
Users that are interested in Detect.Remote.ShadowSnapshot.Dump are comparing it to the libraries listed below
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- ☆47Updated 2 years ago
- ☆28Updated 9 months ago
- ☆53Updated 5 months ago
- ☆17Updated 3 months ago
- ☆41Updated 8 months ago
- ☆20Updated last year
- ☆23Updated 10 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆38Updated 2 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆38Updated last month
- ☆37Updated last month
- BOF for C2 framework☆40Updated 4 months ago
- A pure C version of SymProcAddress☆26Updated last year
- in-process powershell runner for BRC4☆44Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 7 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆30Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆37Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆23Updated last week
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆25Updated last month