#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics
  • LSASS

LSASS

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
LSASSLSASS
+3+3
Spoofing Command Line Arguments to Dump LSASS in Rust
Dec 15, 2023

Spoofing Command Line Arguments to Dump LSASS in Rust

Dylan Reuter
Dylan Reuter
LSASSLSASS
+3+3
Creating a Rootkit to Inject into a Protected Process and Dump LSASS
Sep 11, 2023

Creating a Rootkit to Inject into a Protected Process and Dump LSASS

Dylan Reuter
Dylan Reuter
LSASSLSASS
+2+2
Using API Hooking to Dump LSASS with Task Manager Undetected
Apr 10, 2023

Using API Hooking to Dump LSASS with Task Manager Undetected

Dylan Reuter
Dylan Reuter
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use