postrequest / safetydumpLinks
MiniDump a process in memory with rust
☆36Updated 3 years ago
Alternatives and similar repositories for safetydump
Users that are interested in safetydump are comparing it to the libraries listed below
Sorting:
- Donut generator in rust.☆26Updated 3 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Repository for dirty scripts and PoCs☆17Updated 3 months ago
- ☆58Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- ☆23Updated 3 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆59Updated 2 years ago
- Shellcode reflective DLL injection in Rust☆19Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- LoadLibrary for offensive operations☆33Updated 3 years ago
- Rust implementation of the Process Herpaderping☆24Updated last year
- ☆36Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆97Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Extended Process List (Search functionality)☆29Updated 4 years ago
- ☆23Updated 3 years ago
- ☆38Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- ☆29Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Collection of BOFs for Cobalt Strike☆34Updated 2 years ago
- ☆43Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆25Updated 6 years ago