XMCyber / XMCredentialsDecryptorLinks
☆75Updated last year
Alternatives and similar repositories for XMCredentialsDecryptor
Users that are interested in XMCredentialsDecryptor are comparing it to the libraries listed below
Sorting:
- ☆80Updated 3 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆52Updated last year
- Dump document encryption password from Office process memory☆40Updated 2 years ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆80Updated 2 years ago
- Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3…☆29Updated 4 years ago
- More EFS coerced authentication method with PetitPotam.py☆27Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- dump lsass tool☆38Updated 3 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 10 months ago
- 将PE文件进行AES加密,然后从远程拉取加载内存中实现免杀☆37Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆182Updated 4 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- Perform DCSync operation without mimikatz☆153Updated last year
- Cs-Sleep-Mask-Fiber☆18Updated 7 months ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 3 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆48Updated last year
- DCSync Attack from Outside using Impacket☆116Updated 3 years ago
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆95Updated last year
- Evasive loader to bypass static detection☆59Updated last year
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- ☆17Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆51Updated 2 months ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year