☆52Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for PrintNightmare
Users that are interested in PrintNightmare are comparing it to the libraries listed below
Sorting:
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- upx静态脱壳机源码☆18Oct 21, 2018Updated 7 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Jan 17, 2022Updated 4 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- C# .net Memory Tool library☆13Sep 21, 2022Updated 3 years ago
- woodpecker-framework sdk☆10May 19, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,967Jul 20, 2021Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- ☆14Aug 24, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- LPE exploit for CVE-2023-36802☆24Oct 10, 2023Updated 2 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- resource-based constrained delegation RBCD☆46Jan 15, 2022Updated 4 years ago
- evilzip lets you create a zip file(with password) that contains files with directory traversal characters in their embedded path.☆103Sep 16, 2021Updated 4 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago