Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)
☆72Apr 4, 2026Updated this week
Alternatives and similar repositories for SilentNimvest
Users that are interested in SilentNimvest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆33Feb 4, 2026Updated 2 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 2 weeks ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆40Nov 11, 2025Updated 4 months ago
- kerberos in rust for fun and profit☆69Mar 13, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- ☆59Dec 10, 2025Updated 3 months ago
- ☆36Jul 1, 2025Updated 9 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 3 months ago
- Source code for https://makemydrive.fun☆10Nov 13, 2017Updated 8 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆112Dec 28, 2025Updated 3 months ago
- Claude Code 免杀 SubAgents☆206Mar 31, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆83Updated this week
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated last week
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- ASPX Web Shell with COFF Loader☆126Mar 10, 2026Updated 3 weeks ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆345Feb 2, 2026Updated 2 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆250Mar 26, 2026Updated last week
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- List web account manager (WAM) accounts added to the current profile☆25Dec 11, 2025Updated 3 months ago
- ☆20Sep 6, 2025Updated 7 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Notion C2 Profile for Mythic☆42Mar 3, 2026Updated last month
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 3 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- ☆209Mar 13, 2026Updated 3 weeks ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 11 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆129Aug 19, 2025Updated 7 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago