WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.
☆80Feb 25, 2026Updated last month
Alternatives and similar repositories for WebClientRelayUp
Users that are interested in WebClientRelayUp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 7 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Automate Maldoc creation☆24Apr 22, 2025Updated 11 months ago
- Notion C2 Profile for Mythic☆42Mar 3, 2026Updated last month
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Click Once + App Domain☆67Feb 23, 2026Updated last month
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆83Updated this week
- Awesome MalDev Links☆54Mar 18, 2026Updated 3 weeks ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 6 months ago
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 4 months ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆205Nov 4, 2025Updated 5 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆128Apr 2, 2026Updated last week
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 6 months ago
- Internal Monologue BOF☆78Dec 28, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- Offensive tool for fileless lateral movement on Windows networks☆27May 7, 2024Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated last week
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- Run several volatility containers using multiprocessing☆23Mar 30, 2026Updated last week
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆60Feb 23, 2026Updated last month
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated 2 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆211Mar 31, 2026Updated last week
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- adws enumeration bof☆170Feb 16, 2026Updated last month
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆35Mar 22, 2026Updated 2 weeks ago
- Linux Shared Library to Shellcode Loader☆90Feb 15, 2026Updated last month
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago