KslDump — Why bring your own knife when Defender already left one in the kitchen?
☆312Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for KslDump
Users that are interested in KslDump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# utility for interacting with SCOM☆99Dec 2, 2025Updated 4 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆123Jan 4, 2026Updated 3 months ago
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆213Jan 6, 2026Updated 3 months ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆17Feb 27, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 8 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆210Mar 4, 2026Updated last month
- ☆26Feb 11, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆256Mar 9, 2026Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Apr 23, 2026Updated last week
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆56Mar 22, 2026Updated last month
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆231Sep 19, 2025Updated 7 months ago
- DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.☆169Apr 16, 2026Updated 2 weeks ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆307Mar 28, 2026Updated last month
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆376Apr 23, 2026Updated last week
- This is a Sharp assembly loader in PowerShell☆12Oct 23, 2025Updated 6 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated 3 weeks ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 5 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆289Apr 8, 2026Updated 3 weeks ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆106Aug 21, 2025Updated 8 months ago
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆139Nov 24, 2025Updated 5 months ago
- Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a singl…☆273Apr 11, 2026Updated 2 weeks ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago
- ☆21Mar 19, 2026Updated last month
- The DCERPC only printerbug.py version☆217Oct 30, 2025Updated 6 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago