Red Team Leaders
CtrlK
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Control
  • OFFENSIVE SECURITY
    • Defense Evasion
    • Credential Access
      • Dumping LSASS with Direct Syscalls
    • Windows Internals and API
    • Privilege Escalation
  • Offensive Artificial Intelligence
Powered by GitBook
On this page
  1. OFFENSIVE SECURITY

Credential Access

Dumping LSASS with Direct Syscalls
PreviousHookchain Technique Introduction by Helvio Júnior (M4v3r1ck)NextDumping LSASS with Direct Syscalls