zer1t0 / keydumpLinks
Dump Linux keyrings
☆23Updated last year
Alternatives and similar repositories for keydump
Users that are interested in keydump are comparing it to the libraries listed below
Sorting:
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Updated 2 years ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- ☆59Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆77Updated last year
- ☆83Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Updated 4 months ago
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Updated last year
- ☆59Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆57Updated last year
- ☆92Updated last year
- SAM Dumping in C#☆54Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- A C# port from Invoke-GhostTask☆119Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated 2 years ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 4 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- ☆75Updated last year
- A simple website to act as a store for havoc modules and extensions☆28Updated last year