GossiTheDog / SystemNightmareLinks
Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows
☆387Updated 4 years ago
Alternatives and similar repositories for SystemNightmare
Users that are interested in SystemNightmare are comparing it to the libraries listed below
Sorting:
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆806Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆568Updated last year
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆951Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆859Updated 2 years ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆785Updated 4 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆355Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆368Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,417Updated 2 years ago
- NTLM relaying for Windows made easy☆574Updated 2 years ago
- Get file less command execution for lateral movement.☆629Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Updated 2 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆325Updated 2 years ago
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,138Updated 2 months ago
- The Token Stealer☆502Updated 3 years ago
- Hide your payload in DNS☆615Updated 2 years ago
- ☆344Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆571Updated 2 months ago
- Kerberoast attack -pure python-☆436Updated last year
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,005Updated 3 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆727Updated 4 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆535Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆748Updated 2 years ago