CsEnox / SeManageVolumeExploitLinks
☆159Updated 2 years ago
Alternatives and similar repositories for SeManageVolumeExploit
Users that are interested in SeManageVolumeExploit are comparing it to the libraries listed below
Sorting:
- Precompiled executable☆61Updated 7 months ago
- generate payloads that force authentication against an attacker machine☆110Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆138Updated last year
- A collection of code snippets built to assist with breaking chains.☆124Updated last year
- ☆95Updated 5 years ago
- CLI monitor for windows process- & file activity☆90Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆336Updated last year
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆157Updated 3 years ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆78Updated 9 months ago
- Timeroasting scripts by Tom Tervoort☆362Updated 3 months ago
- 🍊 Orange Tsai EventViewer RCE☆190Updated 3 years ago
- AD ACL abuse☆347Updated 3 weeks ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆328Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆123Updated 3 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆216Updated 2 years ago
- ☆279Updated 3 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆263Updated 3 weeks ago
- Attempt at Obfuscated version of SharpCollection☆222Updated 3 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆75Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆410Updated last year
- A cheatsheet for NetExec☆140Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆294Updated 2 months ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆145Updated last month
- AV Evasion Techniques☆79Updated 3 years ago
- ☆237Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆431Updated 9 months ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆195Updated 7 months ago
- PowerShell Constrained Language Mode Bypass☆280Updated 4 years ago
- ☆34Updated 4 years ago
- Partial python implementation of SharpGPOAbuse☆470Updated last week