yehia-mamdouh / LsassxView external linksLinks
Dumping LSASS Evaded Endpoint Security Solutions
☆18Feb 15, 2025Updated last year
Alternatives and similar repositories for Lsassx
Users that are interested in Lsassx are comparing it to the libraries listed below
Sorting:
- C++ Reflective Assembly Loader☆30Mar 7, 2025Updated 11 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆47Aug 20, 2025Updated 5 months ago
- 此文件用于配套“卫界安全-阿呆攻防”中所涉及的代码类文档☆11Apr 26, 2025Updated 9 months ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Java Chains 插件编写 demo☆14Mar 5, 2025Updated 11 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Apr 23, 2025Updated 9 months ago
- can convert EXE/DLL into position-independent shellcode☆40Feb 1, 2026Updated 2 weeks ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 5 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆55Jul 13, 2025Updated 7 months ago
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated last month
- Developing an open source Windows EDR written in C & C++ & C#☆25Jun 27, 2025Updated 7 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 4 months ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- a minimalistic winrm client written in python☆25May 15, 2025Updated 9 months ago
- 高版本Fastjson在Java原生反序列化中的利用演示☆26Jan 12, 2025Updated last year
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆133Nov 14, 2025Updated 3 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- ☆33Jan 23, 2025Updated last year
- The poc for CVE-2022-26809 RCE via RPC will be updated here.☆20Apr 18, 2022Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Aug 6, 2025Updated 6 months ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated 3 weeks ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated 11 months ago
- Red Teaming Tradecraft☆29Sep 28, 2022Updated 3 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 10 months ago
- Mentally ill EtwTi parser☆67Jan 11, 2026Updated last month
- shell code example☆67Dec 12, 2025Updated 2 months ago
- Get sql server connection configuration information☆28Aug 26, 2024Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆55Dec 4, 2025Updated 2 months ago
- ☆32Apr 23, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 3 weeks ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Jan 12, 2026Updated last month