elephacking / officedumpLinks
Dump document encryption password from Office process memory
☆38Updated 2 years ago
Alternatives and similar repositories for officedump
Users that are interested in officedump are comparing it to the libraries listed below
Sorting:
- CVE-2024-40711-exp☆42Updated 9 months ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆52Updated 4 months ago
- Execute commands in other Sessions☆90Updated 11 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 11 months ago
- Indirect NT syscalls LSASS dumper.☆46Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆58Updated 3 weeks ago
- C# Tool to interact with MS Exchange based on MS docs☆101Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- C# Port of LdapRelayScan☆85Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- ☆43Updated 4 months ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆56Updated 2 years ago
- To audit the security of read-only domain controllers☆117Updated last year
- Use CMSTP.exe to bypass UAC.☆43Updated 3 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- ☆71Updated last year
- Titan: A generic user defined reflective DLL for Cobalt Strike☆75Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Updated last year
- ☆88Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆125Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆140Updated 3 years ago
- ☆88Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆46Updated 2 years ago
- Sliver agent rewritten in C++☆45Updated 10 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year