NUL0x4C / HookingLsassForCredentials
Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials
☆35Updated this week
Alternatives and similar repositories for HookingLsassForCredentials
Users that are interested in HookingLsassForCredentials are comparing it to the libraries listed below
Sorting:
- ☆52Updated 4 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- ☆40Updated last week
- converts sRDI compatible dlls to shellcode☆29Updated 3 months ago
- ☆97Updated 8 months ago
- Threadless shellcode injection tool☆64Updated 9 months ago
- Execute dotnet app from unmanaged process☆74Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆28Updated this week
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Bypassing Amsi using LdrLoadDll☆44Updated 4 months ago
- BypassCredGuard CS BOF☆38Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆81Updated last month
- remote process injections using pool party techniques☆60Updated 3 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 3 months ago
- ☆23Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- ☆71Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- ☆99Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆72Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 11 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago