Offensive-Panda / ShadowDumperLinks
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
☆562Updated 5 months ago
Alternatives and similar repositories for ShadowDumper
Users that are interested in ShadowDumper are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆528Updated 6 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆452Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆443Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆620Updated 5 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆570Updated last year
- Windows remote execution multitool☆723Updated last month
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆434Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆615Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆573Updated last year
- PoC Exploit for the NTLM reflection SMB flaw.☆578Updated 4 months ago
- ☆405Updated 10 months ago
- HookChain: A new perspective for Bypassing EDR Solutions☆569Updated 9 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆359Updated 7 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆376Updated 6 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆421Updated last year
- AdaptixFramework Extension Kit☆291Updated this week
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆706Updated this week
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆509Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆486Updated 5 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆512Updated 5 months ago
- shellcode loader for your evasion needs☆344Updated 6 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆683Updated 5 months ago
- Stealthily inject shellcode into an executable☆384Updated 2 weeks ago
- Tool to remotely dump secrets from the Windows registry☆505Updated 4 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆578Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆545Updated last year
- Amsi Bypass payload that works on Windwos 11☆375Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆583Updated 10 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆438Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆317Updated last year