Offensive-Panda / D3MPSECLinks
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
☆26Updated 11 months ago
Alternatives and similar repositories for D3MPSEC
Users that are interested in D3MPSEC are comparing it to the libraries listed below
Sorting:
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆43Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- ☆58Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆55Updated 5 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆29Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated 11 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Updated 3 weeks ago
- ☆59Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- ☆53Updated 8 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago
- ☆99Updated last year
- ☆37Updated 2 years ago
- ☆82Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆57Updated 8 months ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- ☆50Updated 2 months ago
- ☆109Updated 6 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- ☆29Updated 7 months ago
- Section-based payload obfuscation technique for x64