Skip to content

nrnimesh/HiveDump_Evade

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

HiveDump

A small Windows utility for lab and CTF-style environments that attempts to dump the SAM, SYSTEM, and SECURITY registry hives using SeBackupPrivilege. If the privilege is present in the process token but disabled, the tool tries to enable it, then uses RegSaveKeyExW to write the hive files into the system’s temporary directory.

What it does

Checks whether the process is running elevated. Enumerates token privileges to check for SeBackupPrivilege. Enables it if the token includes it but it’s disabled. Dumps: HKLM\SAM → random name + .bam HKLM\SYSTEM → random name + .bsy HKLM\SECURITY → random name + .bec All dumps are written to %TEMP%.

Use cases

HTB / CTF Windows machines Lab learning on: Windows privilege handling Token manipulation Registry hive access paths

Usage

Run from an elevated context.

If SeBackupPrivilege is available, the hives will be saved into the temp directory.

Notes

This project is intentionally minimal and exists mainly for Windows internals practice. No evasion, stealth, or bypass logic is included. For use on systems you own or are authorized to test.

About

Implementing and Understanding Evasion as I learn in the HiveDumper Tool

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors