3gstudent / From-System-authority-to-Medium-authority
Penetration test
☆55Updated 4 years ago
Alternatives and similar repositories for From-System-authority-to-Medium-authority:
Users that are interested in From-System-authority-to-Medium-authority are comparing it to the libraries listed below
- Search for information from manifests☆44Updated 6 years ago
- No inline asm,support x86/x64☆64Updated 4 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆85Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- DLL_Hijacker.py☆75Updated 9 years ago
- My exercise of using Exchange Web Service(EWS)☆53Updated 4 years ago
- Play Doh Windows ACL Tools☆62Updated 2 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆42Updated 7 years ago
- Stealing passwords every time they change☆66Updated 5 years ago
- ☆91Updated 4 years ago
- a pass-the-hash tool☆105Updated 7 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- Rapid generation ShellCode☆60Updated 7 years ago
- [HIPS]RDP(3389)爆破防护☆45Updated 6 years ago
- ☆15Updated 8 years ago
- ☆74Updated 3 years ago
- ☆17Updated 6 years ago
- cve-2019-0808-poc☆48Updated 6 years ago
- ☆36Updated 4 years ago
- ☆32Updated 7 years ago
- ☆93Updated 3 years ago
- 分析cobaltstrike c2 协议☆68Updated 5 years ago
- List the programs that the current Windows system has installed☆36Updated 7 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- ☆88Updated 2 years ago
- Powershell to copy ntds.dit☆61Updated 8 years ago
- cobalt strike 自启动脚本☆42Updated 8 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago