GamehunterKaan / PlogLinks
A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)
☆59Updated 3 years ago
Alternatives and similar repositories for Plog
Users that are interested in Plog are comparing it to the libraries listed below
Sorting:
- dump lsass☆37Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- resource-based constrained delegation RBCD☆46Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- ☆102Updated 3 years ago
- CVE-2020-1472 C++☆84Updated 3 years ago
- ☆46Updated 4 years ago
- MSSQL CLR for pentest.☆56Updated 2 years ago
- SystemGap - Maintenance Tools after privilege escalation☆47Updated 2 weeks ago
- Re-implement cmd.exe using windows api☆50Updated 2 years ago
- CobaltStrike and Google Auth twice☆63Updated 4 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- desktop screenshot☆29Updated 2 years ago
- geacon for apt profile☆21Updated 3 years ago
- dump lsass tool☆38Updated 3 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- c++ shellcode loader☆40Updated 3 years ago
- This is learning to write windows 32 api instance code in the golang language☆42Updated 4 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- CrackMapExec extension module/protocol support☆42Updated 2 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 4 years ago
- Bypass EDR Create TaskServers☆38Updated 3 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- command execute without 445 port☆57Updated 3 years ago
- 自不量力的mimikatz分离计划☆44Updated 4 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- ☆46Updated last year
- 创建服务持久化☆108Updated 4 years ago