Simple C++ PoC of SeDebugPrivilege Privesc
☆31Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for SeDebugPrivilege-Exploit
Users that are interested in SeDebugPrivilege-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆50Jan 14, 2026Updated 3 months ago
- ☆26Nov 8, 2024Updated last year
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated 3 weeks ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- load shellcode without P/D Invoke and VirtualProtect call.☆169Sep 2, 2025Updated 7 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- a minimalistic winrm client written in python☆28Apr 17, 2026Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Build sneaky & malicious LNK files.☆160Jul 16, 2025Updated 9 months ago
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- kerberos in rust for fun and profit☆71Mar 13, 2026Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 7 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆146Mar 9, 2024Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆201May 4, 2024Updated last year
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Living off the land searches for explorer and sharepoint☆97Dec 7, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆55Feb 22, 2026Updated 2 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆215Apr 20, 2026Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆30Feb 27, 2025Updated last year
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago