pyNtdllOverwrite - API Unhooking in Python
Overwrite ntdll.dll’s “.text” section using a clean version of the DLL using Python.
Ethical hacker | OSCE(3) CRTM CRTL GXPN GRTP GCIH GCPN GWAPT
Overwrite ntdll.dll’s “.text” section using a clean version of the DLL using Python.
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tools like Mimikatz or Pypykatz (SystemInfo, ModuleList and Memory64List Streams).
A very dumb way to access Jenkins protected credentials which I have not found documented anywhere.
GetModuleHandle implementation for remote processes in C# using only NTAPIs: NtQueryInformationProcess, NtReadVirtualMemory and NtOpenProcess.
This website contains most of the P/Invoke definitions from the now offline pinvoke.net, adding the link to the Microsoft documentation for each one.
C# program to parse Microsoft Minidump files.
SharpObfuscate transforms a payload into a list of IPv4, IPv6, MAC or UUID strings. It takes the bytes from a hexadecimal string, a file in the system, a file downloaded from a URL or an ordinary string.
Dump memory regions of a process which are readable (no PAGE_NOACCESS protection) and are commited (MEM_COMMIT state) using only native API calls.