Tool to aid in dumping LSASS process remotely
☆42Sep 23, 2025Updated 6 months ago
Alternatives and similar repositories for go-lsass
Users that are interested in go-lsass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- Simple C# Redirector☆94Aug 31, 2025Updated 7 months ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆388Apr 26, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- ☆136Feb 11, 2025Updated last year
- ☆200Mar 28, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆183May 19, 2025Updated 10 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆193Dec 1, 2024Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 10 months ago
- ☆13Oct 21, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆427Sep 29, 2025Updated 6 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆59Nov 13, 2024Updated last year
- Your Skyfall Infrastructure Pack☆98Apr 10, 2026Updated last week
- A dirty PoC for a reverse shell with cool features in Rust☆188Mar 29, 2026Updated 2 weeks ago
- Good CLR Host with Native patchless AMSI Bypass☆105Apr 18, 2025Updated last year
- ☆384Oct 17, 2025Updated 6 months ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆589Mar 19, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆72Feb 20, 2024Updated 2 years ago
- ☆24Jan 12, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- CLI tool to interact with the BloodHound CE API☆70Mar 6, 2026Updated last month