TwoSevenOneT / WSASSLinks
This is the tool to dump the LSASS process on modern Windows 11
☆540Updated 2 months ago
Alternatives and similar repositories for WSASS
Users that are interested in WSASS are comparing it to the libraries listed below
Sorting:
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆324Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆300Updated 9 months ago
- AdaptixFramework Extension Kit☆355Updated last week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆279Updated 9 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆430Updated 2 years ago
- Stealthily inject shellcode into an executable☆438Updated 2 months ago
- ☆340Updated 2 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆514Updated 2 months ago
- ☆409Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆460Updated 2 years ago
- Use hardware breakpoint to dynamically change SSN in run-time☆278Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆341Updated last year
- Process injection alternative☆404Updated last year
- Fileless atexec, no more need for port 445☆404Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆321Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆380Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆340Updated 3 months ago
- shellcode loader for your evasion needs☆350Updated 8 months ago
- A Beacon Object File (BOF) template for Visual Studio☆258Updated last month
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Updated 2 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆593Updated last year
- A Windows potato to privesc☆389Updated last year
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆314Updated last week
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆267Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆427Updated 6 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆454Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆335Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆365Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆241Updated 2 months ago