XMCyber / XMCredentialsDecryptorLinks
☆76Updated last year
Alternatives and similar repositories for XMCredentialsDecryptor
Users that are interested in XMCredentialsDecryptor are comparing it to the libraries listed below
Sorting:
- Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3…☆29Updated 4 years ago
- ☆80Updated 3 years ago
- Dump document encryption password from Office process memory☆40Updated 2 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆57Updated last year
- CVE-2021-1675 (PrintNightmare)☆77Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 3 years ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆81Updated 2 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆68Updated 5 months ago
- A SigFlip implement in golang☆51Updated 4 years ago
- More EFS coerced authentication method with PetitPotam.py☆27Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- Indirect NT syscalls LSASS dumper.☆46Updated 2 years ago
- ☆46Updated last year
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- Evasive loader to bypass static detection☆59Updated 2 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Updated 4 years ago
- dump lsass tool☆38Updated 3 years ago
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆70Updated last month
- A nim implementation of sRDI☆20Updated 2 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 3 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 10 months ago
- Perform DCSync operation without mimikatz☆153Updated last year
- ☆43Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago