Dump Linux keyrings
☆24Jul 15, 2024Updated last year
Alternatives and similar repositories for keydump
Users that are interested in keydump are comparing it to the libraries listed below
Sorting:
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- ☆26Aug 11, 2025Updated 6 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- ☆40May 21, 2022Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- ☆44Mar 16, 2024Updated last year
- go2 generics experiment in building generic augmented BTree data structures☆25Dec 30, 2025Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆232Feb 12, 2025Updated last year
- ☆109Oct 29, 2024Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆169Sep 12, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆314Updated this week
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- yet another AV killer tool using BYOVD☆305Dec 12, 2023Updated 2 years ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 3 months ago
- ☆60Jan 1, 2026Updated 2 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- ☆60Dec 15, 2023Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Sep 8, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- ☆68Jan 16, 2025Updated last year
- Abuse Azure API permissions for red teaming☆71Jan 24, 2023Updated 3 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆388Jan 20, 2026Updated last month
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year