Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass
-
Updated
Jan 29, 2026 - C
Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass
BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over time.
A Volume Shadow Copy client that allows for easy dumping of SAM/SYSTEM hives and covert data exfiltration to an HTTPS service, without touching disk.
🪟 Windows security tools in Go, Rust & C | Credential dump, token manipulation, DLL injection, keylogger | Native Win32 API | @anonantics
🥶 Freeze EDR/AV processes with ColdWer, using WerFaultSecure.exe PPL bypass to extract LSASS memory on modern Windows systems.
The case illustrates the power of structured host-based triage — beginning with logs and EDR, and moving through file inspection, RAM capture, and finally, network artifact confirmation.
Recording my journey toward the OSCP exam
Advanced memory forensics toolkit for volatile data extraction, credential harvesting, and anti-forensics
Quinn is a Rust-based, modular, Windows credential extraction toolkit built for security professionals
🔍 Analyze and convert credential dumps quickly with dumptools, the fast Rust CLI for threat and intelligence analysts.
Add a description, image, and links to the credential-dumping topic page so that developers can more easily learn about it.
To associate your repository with the credential-dumping topic, visit your repo's landing page and select "manage topics."