Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
- Updated
Jul 27, 2022 - C#
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Detect npm packages compromised in the Shai-Hulud 2.0 supply chain attack (Nov 2025). Scans for 790+ malicious packages, suspicious scripts, TruffleHog activity, SHA1HULUD runners, and secrets exfiltration. GitHub Action with SARIF support.
This repo documents a vulnerability in Siri Shortcuts and Shared Web Credentials (SWC) allowing malformed payloads to persistently execute, trigger retry storms, bypass TLS validation, and request unauthorized entitlements. Confirmed on iOS 18.6.2 with potential iCloud-based propagation.
A DLL injection of RdpThief.dll to perform API hooking and extract RDP credentials
This case study documents a stealthy credential-harvesting technique in which the attacker used a lightweight binary (browserdump.exe) to extract stored credentials from browser cache files—specifically Chrome and Edge—without elevating privileges or triggering persistence indicators.
Add a description, image, and links to the credential-theft topic page so that developers can more easily learn about it.
To associate your repository with the credential-theft topic, visit your repo's landing page and select "manage topics."