alpha1ab / Win2016LPE
Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())
☆102Updated 6 years ago
Alternatives and similar repositories for Win2016LPE:
Users that are interested in Win2016LPE are comparing it to the libraries listed below
- it works on xp (all version sp2 sp3)☆75Updated 5 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 4 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- Apache Solr DataImport Handler RCE☆89Updated 5 years ago
- Stealing passwords every time they change☆64Updated 4 years ago
- Create a hidden account☆75Updated 7 years ago
- a pass-the-hash tool☆107Updated 6 years ago
- My exercise of using Exchange Web Service(EWS)☆53Updated 3 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆80Updated 7 years ago
- mstsc.exe Path Traversal to RCE POC☆90Updated 5 years ago
- ☆93Updated 3 years ago
- ☆128Updated 5 years ago
- ☆51Updated 6 years ago
- CVE-2017-0213 for command line☆57Updated 7 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆43Updated 7 years ago
- ruadmin is a logon *Brute Force* tool, for windows privilege escalation, but also system management.☆94Updated 6 years ago
- CVE-2017-7269 to webshell or shellcode loader☆87Updated 7 years ago
- PowerShell Obfuscator☆16Updated 6 years ago
- cobaltstrike xor64.bin补完计划☆135Updated 6 years ago
- a collection of webshell☆47Updated 6 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆136Updated 4 years ago
- ☆77Updated 6 years ago
- 可以直接反弹shell☆47Updated last year