Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service) memory, often needed in penetration testing and red teaming activities.
It offers flexible options to users and uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
To run ShadowDumper, execute the compiled binary from the powershell.
Default Mode
CommandLine Mode
ShadowDumper.exe
- Parameter: 1: To dump lsass memory using unhooking technique to inject modified mimikatz binary.
ShadowDumper.exe
- Parameter: 2: To dump lsass memory using unhooking technique to inject binary using direct syscalls with MDWD.
ShadowDumper.exe
- Parameter: 3: To dump lsass memory using simple MiniDumpWriteDump API.
ShadowDumper.exe
- Parameter: 4: To dump lsass memory using MINIDUMP_CALLBACK_INFORMATION callbacks.
ShadowDumper.exe
- Parameter: 5: To dump lsass memory using process forking technique.
ShadowDumper.exe
- Parameter: 6: To dump lsass memory using direct syscalls with MiniDumpWriteDump.
ShadowDumper.exe
- Parameter: 7: To dump lsass memory using direct syscalls (native dump with needed streams for parsing offline)
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…