JDArmy / Lsass-ShtinkeringView external linksLinks
dump lsass tool
☆38Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for Lsass-Shtinkering
Users that are interested in Lsass-Shtinkering are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Sep 28, 2022Updated 3 years ago
- command execute without 445 port☆57Feb 25, 2022Updated 3 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Zerologon自动化脚本☆97Sep 20, 2023Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆134Nov 30, 2022Updated 3 years ago
- ☆23Aug 31, 2022Updated 3 years ago
- C Sharp codes of my blog.☆187May 30, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆111Jul 15, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 2 weeks ago
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- ☆46Jun 25, 2024Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Oct 13, 2022Updated 3 years ago
- CVE-2023-21707 EXP☆28Jul 6, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆58May 13, 2023Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆313Nov 29, 2023Updated 2 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- ☆244Sep 19, 2023Updated 2 years ago
- A little tool to play with the Seclogon service☆328Jul 10, 2022Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- CVE-2021-1675 (PrintNightmare)☆77Jul 5, 2021Updated 4 years ago
- ☆142May 4, 2022Updated 3 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- Fully modular persistence framework☆258Apr 10, 2023Updated 2 years ago