Offensive-Panda / ShadowDumper
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
☆533Updated last month
Alternatives and similar repositories for ShadowDumper:
Users that are interested in ShadowDumper are comparing it to the libraries listed below
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆515Updated last week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆583Updated 10 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆383Updated 8 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆516Updated 10 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆408Updated 6 months ago
- Windows remote execution multitool☆388Updated last week
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆407Updated 10 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆449Updated this week
- Collection of UAC Bypass Techniques Weaponized as BOFs☆503Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆517Updated 4 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆354Updated 4 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆542Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆590Updated 10 months ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆290Updated 11 months ago
- ☆353Updated 5 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆612Updated this week
- Materials for the workshop "Red Team Ops: Havoc 101"☆373Updated 7 months ago
- shellcode loader for your evasion needs☆323Updated last week
- Bypassing UAC with SSPI Datagram Contexts☆436Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆420Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆311Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆580Updated 9 months ago
- Protected Process Dumper Tool☆545Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆550Updated 4 months ago
- Simulate the behavior of AV/EDR for malware development training.☆521Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆406Updated 9 months ago
- UAC Bypass By Abusing Kerberos Tickets☆496Updated last year
- CPP AV/EDR Killer☆407Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆502Updated last month