sliverarmory / nanodump
Dump LSASS like you mean it
☆11Updated 8 months ago
Alternatives and similar repositories for nanodump:
Users that are interested in nanodump are comparing it to the libraries listed below
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆11Updated 4 years ago
- Re-implementation of VirtueSecurity's benigncertain-monitor☆11Updated 4 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 4 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- Repository for dirty scripts and PoCs☆17Updated 2 months ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- ☆20Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆50Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- ☆26Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- A PoC executing shellcode in Dart☆15Updated 2 years ago
- Exploit script for CVE-2020-7961☆17Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- A little implant which SSH's back with a shell☆37Updated 3 years ago