Awesome-Red-Teaming
nanodump
Awesome-Red-Teaming | nanodump | |
---|---|---|
8 | 6 | |
6,524 | 1,632 | |
- | 0.9% | |
0.0 | 4.9 | |
4 months ago | 4 days ago | |
C | ||
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Awesome-Red-Teaming
- Career growth in cybersecurity
- i'm literally so far behind compared to everyone else!
- Any useful cybersecurity software under $5k?
-
Cybersecurity Repositories
Red Teaming
- Is there a cheat sheet of security tools and a small description of what they're used for?
-
Struggling to decide if I should take a low paying job offer or focus on studying for cybersecurity certificates. Any advice would be much appreciated.
Red Teaming / pen testing -- set up a home lab. Find a resource on the internet about how to learn red teaming and dig in. Example: https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
-
Red Team Equipment for Budget Proposal
For software, pretty much everything you might need to start out is available as open source. Besides the actual testing stuff, don't forget to look at tools to facilitate collaboration + reporting (highly recommend looking at https://github.com/GhostManager/Ghostwriter). Also checkout: https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
-
Looking for a mentor to show me what the industry in like
Pentesting is a tiny fraction of roles out of 10s of thousands and you're not likely to get an entry level gig on a red team but if you are interested in pen-testing check out https://jhalon.github.io/becoming-a-pentester/ and https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
nanodump
- nanodump: The swiss army knife of LSASS dumping now supports the PPLMedic exploit meaning you can dump LSASS on an up-to-date system with PPL enabled
- add --duplicate-local technique · this allows nanodump to open a handle to LSASS with PROCESS_QUERY_LIMITED_INFORMATION and elevate the handle later this way, we might bypass several detections
-
Ways to Dump LSASS
Excellent writeup. Check out this tool as well, https://github.com/helpsystems/nanodump, it supports cloning existing handles to lsass which is a fun technique for dumping lsass more stealthily. I've seen it work against some modern edrs.
-
Alan c2 post-exploitation framework v5.0 - All you can in-memory edition
The video shows the execution of the `run` command. In the first part, the nanodump (https://github.com/helpsystems/nanodump) utility is executed in an external process (you can see in the video that at a given point the raserver.exe process is spawned).
- GitHub - helpsystems/nanodump: Dumping LSASS has never been so stealthy
- nanodump - Dumping LSASS using syscalls
What are some alternatives?
Starkiller - Starkiller is a Frontend for PowerShell Empire.
CS-Situational-Awareness-BOF - Situational Awareness commands implemented using Beacon Object Files
SharpLAPS - Retrieve LAPS password from LDAP
CrossC2 - generate CobaltStrike's cross-platform payload
Viper - Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Awesome-CobaltStrike - List of Awesome CobaltStrike Resources
Red-Team-Advent-of-Code - Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.
Dumpert - LSASS memory dumper using direct system calls and API unhooking.
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.
amd-ryzen-master-driver-v17-exploit - Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
Awesome-CobaltStrike-Defence - Defences against Cobalt Strike
WindowSpy - WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.