Offensive-Panda / D3MPSEC
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
☆24Updated 5 months ago
Alternatives and similar repositories for D3MPSEC:
Users that are interested in D3MPSEC are comparing it to the libraries listed below
- SAM Dumping in C#☆44Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- ☆52Updated 2 months ago
- All my POC related to malware development☆11Updated 10 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- in-process powershell runner for BRC4☆44Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 10 months ago
- Rewrite to fit my needs☆27Updated 7 months ago
- ☆36Updated 2 years ago
- ☆53Updated 4 months ago
- ☆19Updated 9 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 7 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆45Updated 2 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- ☆10Updated last year
- ☆47Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆19Updated 2 weeks ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆19Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 4 months ago