PhrozenIO / PowerRunAs
This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By default, the standard output (stdout), standard error (stderr), and standard input (stdin) are attached to the current console of the caller.
☆92Updated this week
Alternatives and similar repositories for PowerRunAs:
Users that are interested in PowerRunAs are comparing it to the libraries listed below
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆155Updated 2 years ago
- ☆35Updated 2 years ago
- RDP Checker☆62Updated 11 months ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆24Updated 2 years ago
- Collection of Offensive C# Tooling☆12Updated 3 years ago
- Some random tools I use for penetration testing☆88Updated last week
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆139Updated 10 months ago
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆21Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆140Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆139Updated 9 months ago
- A Python native library containing necessary classes, functions and structures to interact with Windows Active Directory.☆58Updated last week
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- Extracting Syscall Stub, Modernized☆62Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- RDPThief donut shellcode inject into mstsc☆83Updated 3 years ago
- ☆37Updated 2 years ago
- ☆105Updated 6 months ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆51Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 2 months ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 6 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆150Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago