Offensive-Panda / ShadowDumperLinks
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
☆548Updated last month
Alternatives and similar repositories for ShadowDumper
Users that are interested in ShadowDumper are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆524Updated 2 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆428Updated 10 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆602Updated 2 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆423Updated 8 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆553Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆604Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆412Updated last year
- Windows remote execution multitool☆591Updated last month
- Collection of UAC Bypass Techniques Weaponized as BOFs☆524Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆549Updated 6 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆563Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆368Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆362Updated 6 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆493Updated 2 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Updated 11 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆268Updated 2 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆622Updated last month
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆460Updated last month
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Protected Process Dumper Tool☆557Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆517Updated 2 weeks ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆649Updated 2 months ago
- UAC Bypass By Abusing Kerberos Tickets☆498Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆530Updated last year
- ☆401Updated 7 months ago
- ☆713Updated last year
- Tool to remotely dump secrets from the Windows registry☆470Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆313Updated 3 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆381Updated 9 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆696Updated this week