zer1t0 / keydumpLinks
Dump Linux keyrings
☆23Updated last year
Alternatives and similar repositories for keydump
Users that are interested in keydump are comparing it to the libraries listed below
Sorting:
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- ☆59Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated 2 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Updated last year
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆55Updated last month
- A simple website to act as a store for havoc modules and extensions☆28Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆61Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year
- ☆83Updated last year
- SAM Dumping in C#☆54Updated 2 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆28Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆77Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Updated 4 months ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 5 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Updated 3 weeks ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- ☆75Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month