Helixo32 / GetSystem-LCI
GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstaller.
☆19Updated this week
Related projects ⓘ
Alternatives and complementary repositories for GetSystem-LCI
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- ☆43Updated 4 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- Lateral Movement☆119Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆43Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆20Updated 3 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆104Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆59Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- Abuse Azure API permissions for red teaming☆58Updated last year
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated last week
- Enumerate the Domain for Readable and Writable Shares☆16Updated 5 months ago
- ☆55Updated 7 months ago
- ☆45Updated 3 weeks ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 5 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆92Updated 9 months ago
- Simple netexec wraper with html repport☆17Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago