CobblePot59 / ad-cve-privescLinks
Documentation of main privilege escalation vulnerabilities affecting Active Directory.
☆14Updated 3 weeks ago
Alternatives and similar repositories for ad-cve-privesc
Users that are interested in ad-cve-privesc are comparing it to the libraries listed below
Sorting:
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- ☆63Updated last year
- Windows internals and exploitation tricks☆108Updated last month
- Tool to aid in dumping LSASS process remotely☆42Updated 3 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 3 months ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆50Updated 10 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆53Updated 2 years ago
- ☆44Updated 10 months ago
- A Python native library containing necessary classes, functions and structures to interact with Windows Active Directory.☆69Updated 3 weeks ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Source code and examples for PassiveAggression☆64Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆34Updated last year
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 3 years ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆26Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆106Updated last year
- A collection of PoCs for different injection techniques on Windows!☆47Updated 2 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- ☆59Updated last year