Cobalt-Strike / ElevateKitLinks
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
☆122Updated 4 years ago
Alternatives and similar repositories for ElevateKit
Users that are interested in ElevateKit are comparing it to the libraries listed below
Sorting:
- Inject remote template link into word document for remote template injection☆177Updated 4 years ago
- ☆159Updated 6 months ago
- Payload Generation Framework☆91Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆86Updated 3 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆336Updated last year
- PowerShell Constrained Language Mode Bypass☆266Updated 4 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆151Updated 3 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- ☆144Updated 2 months ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆277Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP