0xb11a1 / sliver_extension_uac_bypass_cmstp
Sliver extension to bypass UAC via cmstp written in rust
☆24Updated 8 months ago
Alternatives and similar repositories for sliver_extension_uac_bypass_cmstp:
Users that are interested in sliver_extension_uac_bypass_cmstp are comparing it to the libraries listed below
- ☆48Updated 3 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 10 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated this week
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆54Updated 3 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Situational Awareness script to identify how and where to run implants☆45Updated 2 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆30Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated 2 months ago
- ☆52Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year