Flangvik / DeployPrinterNightmare
C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!
☆183Updated 3 years ago
Alternatives and similar repositories for DeployPrinterNightmare:
Users that are interested in DeployPrinterNightmare are comparing it to the libraries listed below
- Tool for interacting with outlook interop during red team engagements☆143Updated 3 years ago
- ☆129Updated 4 years ago
- Remotely enables Restricted Admin Mode☆208Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆240Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆188Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆140Updated 4 years ago
- C# version of Powermad☆162Updated last year
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 4 years ago
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆146Updated 4 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- ☆92Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Cobalt Strike Beacon Object Files☆160Updated 2 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆267Updated last year
- ☆162Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆140Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- Run Rubeus via Rundll32☆199Updated 4 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆234Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆141Updated 3 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆157Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆119Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆123Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆142Updated 3 years ago
- ☆184Updated 4 years ago
- Dump stuff without touching disk☆162Updated 4 years ago