#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics
  • Rootkit

Rootkit

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
LSASSLSASS
+3+3
Creating a Rootkit to Inject into a Protected Process and Dump LSASS
Sep 11, 2023

Creating a Rootkit to Inject into a Protected Process and Dump LSASS

Dylan Reuter
Dylan Reuter
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use