Offensive-Panda / ShadowDumperLinks
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
☆565Updated 6 months ago
Alternatives and similar repositories for ShadowDumper
Users that are interested in ShadowDumper are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆532Updated 2 weeks ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆457Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆448Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆621Updated 6 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆436Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆576Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆575Updated last year
- Windows remote execution multitool☆738Updated last month
- PoC Exploit for the NTLM reflection SMB flaw.☆600Updated 5 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆618Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆572Updated 10 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆383Updated 8 months ago
- AdaptixFramework Extension Kit☆301Updated this week
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆743Updated 3 weeks ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆489Updated 6 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆524Updated 6 months ago
- Stealthily inject shellcode into an executable☆400Updated last month
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆687Updated 6 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆581Updated last year
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- Evasive shellcode loader☆398Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆503Updated 2 years ago
- Useful C2 techniques and cheat sheets learned from engagements☆562Updated 2 months ago
- ☆407Updated 11 months ago
- Tool to remotely dump secrets from the Windows registry☆510Updated last week
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆652Updated 3 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆388Updated 2 months ago
- Protected Process Dumper Tool☆569Updated 2 years ago
- shellcode loader for your evasion needs☆346Updated 7 months ago