Offensive-Panda / D3MPSECLinks
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
☆27Updated last year
Alternatives and similar repositories for D3MPSEC
Users that are interested in D3MPSEC are comparing it to the libraries listed below
Sorting:
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- ☆59Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆30Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- ☆109Updated 9 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆102Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 6 months ago
- ☆98Updated last year
- I have documented all of the AMSI patches that I learned till now☆76Updated last month
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆82Updated last month
- ☆61Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated last year
- ☆82Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- ☆52Updated 2 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 10 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆50Updated 4 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆84Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 6 months ago
- Sniffing files generator☆59Updated 9 months ago