GossiTheDog / SystemNightmareLinks
Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows
☆386Updated 4 years ago
Alternatives and similar repositories for SystemNightmare
Users that are interested in SystemNightmare are comparing it to the libraries listed below
Sorting:
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆569Updated last year
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆953Updated 4 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆863Updated 2 years ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆795Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,435Updated 3 years ago
- A PowerShell armoury for security guys and girls☆468Updated last year
- Get file less command execution for lateral movement.☆632Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆607Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,149Updated last month
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 3 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated 2 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆877Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- NTLM relaying for Windows made easy☆577Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆333Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Updated 3 years ago
- Kerberoast attack -pure python-☆434Updated 2 years ago
- An Office365 User Attack Tool☆645Updated last year
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Updated last year
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆738Updated 5 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆425Updated 4 years ago
- Hide your payload in DNS☆618Updated 2 years ago
- "Golden" certificates☆706Updated last year
- Maximizing BloodHound. Max is a good boy.☆529Updated 8 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆601Updated 5 months ago