YOLOP0wn / POSTDumpLinks
☆334Updated 5 months ago
Alternatives and similar repositories for POSTDump
Users that are interested in POSTDump are comparing it to the libraries listed below
Sorting:
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆455Updated last month
- Credential Guard Bypass Via Patching Wdigest Memory☆328Updated 2 years ago
- Cobalt Strike BOF for evasive .NET assembly execution☆261Updated 3 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆314Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆397Updated last year
- Attempt at Obfuscated version of SharpCollection☆216Updated last month
- Fileless atexec, no more need for port 445☆386Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆618Updated last month
- A Visual Studio template used to create Cobalt Strike BOFs☆308Updated 3 years ago
- Terminate AV/EDR Processes using kernel driver☆347Updated 2 years ago
- Bypassing UAC with SSPI Datagram Contexts☆442Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆476Updated 3 months ago
- A BOF that runs unmanaged PEs inline☆611Updated 8 months ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆455Updated 11 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆326Updated 2 years ago
- COM Hijacking VOODOO☆299Updated 3 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆298Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆238Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆340Updated 2 years ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆492Updated last month
- A Windows potato to privesc☆373Updated 10 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆295Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆521Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆305Updated last year
- ☆220Updated last year
- A Tool that aims to evade av with binary padding☆153Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆323Updated 2 years ago
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- AdaptixFramework Extension Kit☆161Updated last month
- UAC Bypass By Abusing Kerberos Tickets☆498Updated last year