专注挖掘高质量开源项目、生产力工具与宝藏 App。

在代码与逻辑之间,带你发现那些让生活更高效、更有趣的硬核干货。
🚀 技术不只是工具,更是折腾的艺术。

偶尔深夜发车,请系好安全带 🛠️
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Credential Dumping

📦 项目名称: ShadowHunt
👤 项目作者: elonmasai7
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 16:10:21

📝 项目描述:
ShadowHunt is a lightweight, containerized framework for ethical red-team training. It simulates MITRE ATT&CK techniques like credential dumping and lateral movement in isolated Docker labs, detects them with Suricata, OSSEC, and ML anomalies, and visualizes results on a real-time Streamlit dashboard.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Credential Dumping

📦 项目名称: Mordor-Dataset-Analysis
👤 项目作者: goodnessibeh
🛠 开发语言: JavaScript
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-17 15:16:42

📝 项目描述:
Threat hunting analysis of LSASS credential dumping (T1003.001) using the Mordor adversary simulation dataset

🔗 点击访问项目地址 GitHub - goodnessibeh/Mordor-Dataset-Analysis: Threat hunting analysis of LSASS credential dumping (T1003.001) using the Mordor…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Credential Dumping

📦 项目名称: Advanced-SOC-Lab-Threat-Hunting
👤 项目作者: phuongtech24
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-16 08:24:17

📝 项目描述:
Advanced Windows Threat Hunting Lab: End-to-end detection of LSASS Credential Dumping, Parent PID Spoofing, and DLL Side-Loading (.NET) using Wazuh SIEM & Sysmon custom rules

🔗 点击访问项目地址 GitHub - phuongtech24/Advanced-SOC-Lab-Threat-Hunting: Advanced Windows Threat Hunting Lab: End-to-end detection of LSASS Credential…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Credential Dumping

📦 项目名称: credential-dumping-investigation
👤 项目作者: Ashish12373
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-12 04:20:48

📝 项目描述:
无描述

🔗 点击访问项目地址 GitHub - Ashish12373/credential-dumping-investigation
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Credential Dumping

📦 项目名称: Password-Cracking-Credential-Attack-Suite
👤 项目作者: Tatyasaheb-27
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 22:58:09

📝 项目描述:
This project focuses on the design and development of a practical toolkit for password policy testing and credential security assessment. Weak passwords are among the most exploited vulnerabilities in cybersecurity. Attackers commonly use dictionary attacks, credential dumping, and brute-force techniques to gain unauthorized access to systems.

🔗 点击访问项目地址 GitHub - Tatyasaheb-27/Password-Cracking-Credential-Attack-Suite: This project focuses on the design and development of a practical…
 
 
Back to Top