Extract Windows credentials directly from VM memory snapshots and virtual disks
☆748Mar 24, 2026Updated this week
Alternatives and similar repositories for VMkatz
Users that are interested in VMkatz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆42Dec 7, 2025Updated 3 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆112Dec 28, 2025Updated 3 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Bypass LSA protection using the BYODLL technique☆177Sep 21, 2024Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆332Updated this week
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Mar 26, 2023Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- Lnk crafting and research tools☆151Mar 4, 2026Updated 3 weeks ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Make everyone in your VLAN ASRep roastable☆250Oct 7, 2025Updated 5 months ago
- Host CLR and run .NET binaries using Rust☆155Dec 23, 2025Updated 3 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,866Mar 22, 2026Updated last week
- A tool to play with scheduled tasks on Windows, in Rust☆122Nov 1, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆20Mar 2, 2026Updated 3 weeks ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated last month
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆379Mar 7, 2026Updated 3 weeks ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Updated this week
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆37Mar 11, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆528Oct 3, 2025Updated 5 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll