alpha1ab / Win2016LPE
Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())
☆102Updated 6 years ago
Alternatives and similar repositories for Win2016LPE:
Users that are interested in Win2016LPE are comparing it to the libraries listed below
- ☆128Updated 5 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 4 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- CVE-2017-7269 to webshell or shellcode loader☆87Updated 7 years ago
- a pass-the-hash tool☆105Updated 7 years ago
- ☆30Updated 5 years ago
- Stealing passwords every time they change☆66Updated 5 years ago
- ruadmin is a logon *Brute Force* tool, for windows privilege escalation, but also system management.☆95Updated 6 years ago
- ☆51Updated 6 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆138Updated 4 years ago
- ☆77Updated 6 years ago
- Create a hidden account☆75Updated 7 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。☆45Updated 4 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆42Updated 7 years ago
- CVE-2020-0688 - Exchange☆65Updated 5 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆81Updated 8 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 5 years ago
- ☆93Updated 3 years ago
- My exercise of using Exchange Web Service(EWS)☆53Updated 3 years ago
- ☆85Updated 5 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- Apache Solr DataImport Handler RCE☆89Updated 5 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- PowerShell Obfuscator☆16Updated 7 years ago
- cobalt strike 自启动脚本☆42Updated 8 years ago
- mstsc.exe Path Traversal to RCE POC☆89Updated 5 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆84Updated 3 years ago
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago