☆33Feb 27, 2024Updated 2 years ago
Alternatives and similar repositories for DumpLSASS
Users that are interested in DumpLSASS are comparing it to the libraries listed below
Sorting:
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆39Jul 1, 2025Updated 8 months ago
- ☆65May 26, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Updated this week
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- KQL Cafe Website☆15Mar 3, 2026Updated 2 weeks ago
- ☆17Jul 20, 2024Updated last year
- Red Team Operation's Defense Evasion Technique.☆56Jun 4, 2024Updated last year
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆27Nov 15, 2017Updated 8 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated last month
- CIS Benchmark for Server Hardening RHEL Ubuntu☆13Apr 6, 2018Updated 7 years ago
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated last month
- Articles and labs relating to P2S Client VPN solutions on Microsoft Azure☆17Jun 9, 2023Updated 2 years ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 7 months ago
- ☆13May 30, 2025Updated 9 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆24Feb 18, 2025Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- ☆16Mar 12, 2026Updated last week
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆136Dec 20, 2022Updated 3 years ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆63Jul 27, 2025Updated 7 months ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆33Nov 2, 2020Updated 5 years ago
- Administrative Template (ADMX) for Microsoft Defender Attack Surface Reduction (ASR)☆15Jul 7, 2025Updated 8 months ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- ☆10Jul 3, 2021Updated 4 years ago