wolfcod / lsassdumpLinks
lsassdump via RtlCreateProcessReflection and NanoDump
☆84Updated last year
Alternatives and similar repositories for lsassdump
Users that are interested in lsassdump are comparing it to the libraries listed below
Sorting:
- ☆75Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54Updated 8 months ago
- ☆100Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Updated last year
- ☆109Updated 11 months ago
- ☆83Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆75Updated 3 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆105Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Updated last year
- ☆122Updated 2 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 5 months ago
- ☆126Updated last year
- ☆118Updated last year
- ☆100Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated last month
- ☆53Updated 4 months ago
- Threadless shellcode injection tool☆68Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆85Updated 9 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Updated 6 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 9 months ago
- ☆131Updated 2 years ago
- remote process injections using pool party techniques☆70Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year