Offensive-Panda / D3MPSEC
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
☆24Updated 6 months ago
Alternatives and similar repositories for D3MPSEC:
Users that are interested in D3MPSEC are comparing it to the libraries listed below
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆49Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆33Updated 6 months ago
- in-process powershell runner for BRC4☆45Updated last year
- ☆52Updated 3 months ago
- ☆54Updated 5 months ago
- Proxy function calls through the thread pool with ease☆25Updated last month
- ☆27Updated 2 months ago
- BOF for C2 framework☆40Updated 5 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 11 months ago
- Rewrite to fit my needs☆27Updated 8 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆40Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆31Updated last year
- ☆20Updated 10 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆79Updated 5 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆28Updated 8 months ago
- ☆36Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- All my POC related to malware development☆11Updated 11 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆48Updated last year
- ☆18Updated 6 months ago
- ☆96Updated 7 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆26Updated 10 months ago