☆58Apr 30, 2025Updated 11 months ago
Alternatives and similar repositories for LSASS-Forked-Dump---Bypass-EDR-CrowdStrike
Users that are interested in LSASS-Forked-Dump---Bypass-EDR-CrowdStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AppLocker-Based EDR Neutralization☆327Dec 19, 2025Updated 3 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- command control framework☆33Updated this week
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 5 months ago
- ☆50Oct 14, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Evasive loader to bypass static detection☆60Jan 15, 2024Updated 2 years ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- Ghosting-AMSI☆228Apr 24, 2025Updated 11 months ago
- ☆52May 4, 2025Updated 10 months ago
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 6 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆195Nov 23, 2025Updated 4 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Assess the security of your Active Directory with few or all privileges.☆360Mar 16, 2026Updated last week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆86Oct 18, 2024Updated last year
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆373Jan 29, 2026Updated 2 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆272Jun 18, 2025Updated 9 months ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆186Dec 23, 2025Updated 3 months ago
- ☆53Sep 23, 2025Updated 6 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆37Mar 11, 2026Updated 2 weeks ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago