Tool to manage user privileges
☆31Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for sepriv
Users that are interested in sepriv are comparing it to the libraries listed below
Sorting:
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ☆37Nov 8, 2024Updated last year
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 3 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- ☆53Oct 27, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 5 months ago
- Bof of RegPwn by MDSec☆72Mar 15, 2026Updated last week
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- ☆12Oct 9, 2020Updated 5 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- MSI creator for exe setup/installer☆11Jun 27, 2023Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A small C utility that encodes bytes into whitespace characters.☆25Sep 28, 2021Updated 4 years ago
- ☆20Sep 6, 2025Updated 6 months ago