WhiteOakSecurity / MiniDumpDotNetLinks
☆28Updated 3 years ago
Alternatives and similar repositories for MiniDumpDotNet
Users that are interested in MiniDumpDotNet are comparing it to the libraries listed below
Sorting:
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Utilities for obfuscating shellcode☆97Updated 3 months ago
- ☆120Updated 9 months ago
- ☆75Updated 9 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆97Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- Payload Generation Framework☆20Updated last year
- The DCERPC only printerbug.py version☆187Updated 2 months ago
- ☆62Updated 2 years ago
- ☆102Updated 11 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 months ago
- Tools I use on red team engagements and more☆33Updated last year
- Payload Generation Framework☆98Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Updated 5 months ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- ☆79Updated 11 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆185Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- Rusty Impersonate☆102Updated 3 months ago
- Find DLLs with RWX section☆80Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆101Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago