Category: Post Exploitation

Linux Credentials Dumper

pamspy: Credentials Dumper for Linux using eBPF

pamspy — Credentials Dumper for Linux pamspy leverages eBPF technologies to achieve an equivalent work of 3snake. It will track a particular userland function inside the PAM (Pluggable Authentication Modules) library, used by many...

Endpoint Detection

EDRHunt v1.4.2 releases: Scan installed EDRs and AVs on Windows

EDRHunt EDRHunt scans Windows services, drivers, processes, the registry for installed EDRs (Endpoint Detection And Response). Detections EDR Detections Currently Available Windows Defender Kaspersky Security Symantec Security Crowdstrike Security Mcafee Security Cylance Security Carbon...