Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already saved SAM and SYSTEM hives.
☆66Dec 29, 2023Updated 2 years ago
Alternatives and similar repositories for hash-dumper
Users that are interested in hash-dumper are comparing it to the libraries listed below
Sorting:
- ☆53Sep 23, 2025Updated 5 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆125Dec 6, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- Host CLR and run .NET binaries using Rust☆151Dec 23, 2025Updated 2 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆54Jun 2, 2025Updated 8 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- ☆64Dec 19, 2024Updated last year
- ☆38Apr 15, 2025Updated 10 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- ☆26Feb 11, 2025Updated last year
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- ☆159Apr 17, 2024Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆123Jan 17, 2026Updated last month
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- Collect Windows telemetry for Maldev☆460Jan 30, 2026Updated last month
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆190Feb 16, 2026Updated last week
- ☆127Dec 12, 2025Updated 2 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 5 months ago
- ☆126Sep 1, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago