markuta / bw-dump
A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.
☆39Updated last year
Alternatives and similar repositories for bw-dump:
Users that are interested in bw-dump are comparing it to the libraries listed below
- Spoofing desktop login applications with WinForms and WPF☆172Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆135Updated 7 months ago
- Python utility that generates "imageless" QR codes in various formats☆115Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- POC for DLL Proxying / Hijacking☆60Updated last month
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 8 months ago
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated last year
- ☆117Updated last week
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆72Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆128Updated 4 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆39Updated 6 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆118Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆106Updated 2 months ago