elephacking / officedumpLinks
Dump document encryption password from Office process memory
☆40Updated 2 years ago
Alternatives and similar repositories for officedump
Users that are interested in officedump are comparing it to the libraries listed below
Sorting:
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆58Updated last year
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- Indirect NT syscalls LSASS dumper.☆46Updated 2 years ago
- AV/EDR killer using BYOVD technique☆43Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85Updated 2 years ago
- Execute commands in other Sessions☆91Updated last year
- Evasive loader to bypass static detection☆59Updated 2 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- ☆143Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- CVE-2024-40711-exp☆42Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 11 months ago
- Remotely dump NT hashes through Windows Crash dumps☆34Updated last year
- Test bench lab for Shellcode Obfuscation☆33Updated 5 months ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- HookDetection☆45Updated 4 years ago
- Sliver agent rewritten in C++☆49Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆60Updated last week
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆145Updated 4 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Updated 5 months ago