0xb11a1 / sliver_extension_uac_bypass_cmstp
Sliver extension to bypass UAC via cmstp written in rust
☆21Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for sliver_extension_uac_bypass_cmstp
- ☆44Updated 3 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 11 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- Sliver agents for Mythic☆35Updated this week
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆88Updated last month
- A Moodle Scanner☆35Updated this week
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Enumerate the Domain for Readable and Writable Shares☆16Updated 5 months ago
- ☆37Updated 3 weeks ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆20Updated 3 months ago
- ☆51Updated last year
- ☆25Updated last year
- Cobalt Strike BOFS☆16Updated 11 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆66Updated last year
- Windows Thread Pool Injection Havoc Implementation☆28Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- ☆25Updated last year