Meckazin / ChromeKatz
Dump cookies and credentials directly from Chrome/Edge process memory
☆1,034Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for ChromeKatz
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆952Updated 10 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,148Updated last year
- Little user-mode AV/EDR evasion lab for training & learning purposes☆994Updated 6 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,461Updated this week
- Real fucking shellcode encryptor & obfuscator tool☆735Updated this week
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆492Updated 3 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆627Updated 2 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆410Updated 2 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆923Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆638Updated 5 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆465Updated 4 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆510Updated 4 months ago
- Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.☆753Updated 4 months ago
- HVNC for Cobalt Strike☆1,156Updated 11 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆549Updated 4 months ago
- HookChain: A new perspective for Bypassing EDR Solutions☆399Updated 2 months ago
- Windows Local Privilege Escalation Cookbook☆967Updated 7 months ago
- ☆673Updated 7 months ago
- Protected Process Dumper Tool☆517Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆708Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆554Updated 3 weeks ago
- Simulate the behavior of AV/EDR for malware development training.☆452Updated 8 months ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆883Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆327Updated 2 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆920Updated this week
- reverse shell using curl☆447Updated 6 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆632Updated 9 months ago
- ☆491Updated 7 months ago
- kill anti-malware protected processes ( BYOVD) (Microsoft Won )☆897Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆466Updated 3 months ago