Offensive-Panda / D3MPSECLinks
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
☆24Updated 9 months ago
Alternatives and similar repositories for D3MPSEC
Users that are interested in D3MPSEC are comparing it to the libraries listed below
Sorting:
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆55Updated 8 months ago
- A pure C version of SymProcAddress☆28Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- ☆27Updated 5 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago
- BOF for C2 framework☆41Updated 8 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 9 months ago
- ☆20Updated last year
- ☆47Updated this week
- ☆47Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 7 months ago
- Less sugar (entropy) for your binaries☆28Updated 3 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- ☆59Updated last year
- ☆28Updated 11 months ago
- All my POC related to malware development☆11Updated last year
- ☆36Updated 2 years ago
- ☆48Updated 2 years ago