samisecure / LsassDumpReflectiveDllLinks
Dump Lsass Memory Using a Reflective Dll
☆14Updated 3 years ago
Alternatives and similar repositories for LsassDumpReflectiveDll
Users that are interested in LsassDumpReflectiveDll are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- ☆48Updated 4 years ago
- ☆15Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- ☆24Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Some stuff for PHD2021☆14Updated 2 weeks ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- ☆25Updated 2 years ago
- ☆12Updated 5 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- ☆18Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Receive the status of Windows Defender Credential Guard on network hosts.☆27Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 6 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆15Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆22Updated 2 years ago