avi7611 / UAC-Bypass
A shot code to Bypass UAC in Windows.
☆26Updated 3 years ago
Alternatives and similar repositories for UAC-Bypass
Users that are interested in UAC-Bypass are comparing it to the libraries listed below
Sorting:
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 11 months ago
- AzureAD Pentest☆19Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- ☆29Updated 4 years ago
- OSWE Preparation☆37Updated 5 years ago
- This is to reorganize my notes☆10Updated 4 years ago
- ☆30Updated 2 years ago
- ☆47Updated 3 years ago
- ☆39Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆172Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 10 months ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- Journey so Far☆22Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆97Updated 3 years ago
- C# tool to discover low hanging fruits☆93Updated 2 years ago
- ☆31Updated 3 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆117Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- ☆13Updated last month
- ☆12Updated 2 years ago