elephacking / officedumpLinks
Dump document encryption password from Office process memory
☆39Updated 2 years ago
Alternatives and similar repositories for officedump
Users that are interested in officedump are comparing it to the libraries listed below
Sorting:
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- ☆141Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 6 months ago
- Indirect NT syscalls LSASS dumper.☆46Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Execute commands in other Sessions☆90Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- ☆88Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆140Updated 4 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆58Updated last week
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆174Updated last month
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated 10 months ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- ☆100Updated 2 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆49Updated last year
- ☆81Updated last year
- To audit the security of read-only domain controllers☆118Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- C# Port of LdapRelayScan☆85Updated 3 years ago