Muz1K1zuM / kslkatz_bof
PublicHavoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable API calls.
A red team toolkit for the Havoc C2 framework that extracts Windows credentials stealthily using a pre-installed Microsoft driver.
How It Works
You hear about a helpful security testing tool from fellow testers on GitHub or forums.
Download the files and prepare them simply so they're good to go for your tests.
In your own controlled lab, connect to a Windows computer you're allowed to test.
Launch the tool during your session to quietly look for stored logins without alerts.
The tool runs smoothly in the background, gathering info securely.
Get a clear list of usernames, passwords, and hashes right in your session.
Finish your security check with valuable insights for your report, all cleaned up safely.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.