Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation
☆31Sep 24, 2022Updated 3 years ago
Alternatives and similar repositories for DumpThatLSASS
Users that are interested in DumpThatLSASS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 13 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 3 months ago
- ☆124Oct 9, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆33Dec 30, 2020Updated 5 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- BypassCredGuard CS BOF☆53Jan 23, 2025Updated last year
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆86May 7, 2023Updated 2 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Nov 24, 2020Updated 5 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆12Oct 19, 2024Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 3 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Detect WFP filters blocking EDR communications☆97Jan 5, 2024Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 9 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- ☆23Jul 29, 2021Updated 4 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Lifetime AMSI bypass☆674Sep 26, 2023Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- COFF and BOF Loader written in Nim☆174Apr 4, 2026Updated 3 weeks ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Repo that holds random POCs☆58Mar 16, 2026Updated last month
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago