☆59Apr 30, 2025Updated last year
Alternatives and similar repositories for LSASS-Forked-Dump---Bypass-EDR-CrowdStrike
Users that are interested in LSASS-Forked-Dump---Bypass-EDR-CrowdStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AppLocker-Based EDR Neutralization☆336Dec 19, 2025Updated 4 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆18Oct 13, 2025Updated 6 months ago
- ☆50Oct 14, 2025Updated 6 months ago
- command control framework☆33Apr 29, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Evasive loader to bypass static detection☆60Jan 15, 2024Updated 2 years ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- Ghosting-AMSI☆236Apr 24, 2025Updated last year
- ☆52May 4, 2025Updated last year
- Enumerate active EDR's on the system☆154Sep 23, 2025Updated 7 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆199Nov 23, 2025Updated 5 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 4 months ago
- Assess the security of your Active Directory with few or all privileges.☆369Updated this week
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆45Mar 13, 2026Updated last month
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆87Oct 18, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆384Apr 26, 2026Updated last week
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆275Jun 18, 2025Updated 10 months ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆193Dec 23, 2025Updated 4 months ago
- ☆52Mar 30, 2026Updated last month
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 5 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆39Mar 11, 2026Updated last month
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 9 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year