Dumping credentials through windbg and pykd
☆41Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for PykDumper
Users that are interested in PykDumper are comparing it to the libraries listed below
Sorting:
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- ☆48May 12, 2021Updated 4 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 6 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- maldev obviously☆28May 5, 2025Updated 9 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago