Kudaes / DumpyLinks
Reuse open handles to dynamically dump LSASS.
☆244Updated last year
Alternatives and similar repositories for Dumpy
Users that are interested in Dumpy are comparing it to the libraries listed below
Sorting:
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆242Updated 2 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆269Updated last year
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆195Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆150Updated 3 years ago
- You shall pass☆268Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆161Updated 4 years ago
- Coerce Windows machines auth via MS-EVEN☆168Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆311Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆134Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆216Updated 4 years ago
- Shaco is a linux agent for havoc☆167Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆290Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆297Updated 4 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆283Updated 2 years ago
- Beacon Object File Loader☆296Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆203Updated last year
- Port of Cobalt Strike's Process Inject Kit☆188Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆184Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆322Updated 2 years ago
- ☆245Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆260Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆323Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆226Updated 3 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- ☆161Updated 2 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆318Updated 3 years ago
- ☆143Updated 2 years ago