GossiTheDog / SystemNightmareLinks
Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows
☆385Updated 4 years ago
Alternatives and similar repositories for SystemNightmare
Users that are interested in SystemNightmare are comparing it to the libraries listed below
Sorting:
- Create fake certs for binaries using windows binaries and the power of bat files☆568Updated last year
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆802Updated last year
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆950Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆857Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,137Updated last month
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆781Updated 4 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated 2 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- NTLM relaying for Windows made easy☆573Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆367Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,413Updated 2 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆323Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- The Token Stealer☆502Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆804Updated 3 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆533Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆444Updated 2 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆725Updated 4 years ago
- "Golden" certificates☆705Updated last year
- Get file less command execution for lateral movement.☆629Updated 3 years ago
- Kerberoast attack -pure python-☆436Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆562Updated last month
- An Office365 User Attack Tool☆642Updated last year
- A PowerShell armoury for security guys and girls☆470Updated last year
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- ☆344Updated 4 years ago
- C# Script used for Red Team☆723Updated 3 years ago