KslDump — Why bring your own knife when Defender already left one in the kitchen?
☆333Apr 13, 2026Updated last month
Alternatives and similar repositories for KslDump
Users that are interested in KslDump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# utility for interacting with SCOM☆100Dec 2, 2025Updated 5 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆123Jan 4, 2026Updated 4 months ago
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 5 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆215Jan 6, 2026Updated 4 months ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆17Feb 27, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 9 months ago
- ☆82Apr 8, 2026Updated last month
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆218Mar 4, 2026Updated 2 months ago
- ☆26Feb 11, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆256Mar 9, 2026Updated 2 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆193Apr 26, 2025Updated last year
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆32Dec 20, 2025Updated 5 months ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19May 13, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆59Mar 22, 2026Updated last month
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 9 months ago
- Lab research on Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.☆235May 4, 2026Updated 2 weeks ago
- DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.☆186Apr 16, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆309Mar 28, 2026Updated last month
- ☆17Jun 16, 2025Updated 11 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆390May 12, 2026Updated last week
- This is a Sharp assembly loader in PowerShell☆15Oct 23, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆106Apr 4, 2026Updated last month
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆37Feb 27, 2025Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 6 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆109Aug 21, 2025Updated 9 months ago
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆139Nov 24, 2025Updated 5 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆300May 6, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 7 months ago
- Shellcode reflective DLL injection in Rust☆30May 3, 2026Updated 2 weeks ago
- BOF with Synthetic Stackframe☆247Oct 30, 2025Updated 6 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆337May 4, 2026Updated 2 weeks ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a singl…☆289Apr 11, 2026Updated last month