bruno-1337 / SeDebugPrivilege-ExploitLinks
Simple C++ PoC of SeDebugPrivilege Privesc
☆26Updated last year
Alternatives and similar repositories for SeDebugPrivilege-Exploit
Users that are interested in SeDebugPrivilege-Exploit are comparing it to the libraries listed below
Sorting:
- Local & remote Windows DLL Proxying☆165Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- ☆52Updated 3 years ago
- Create Anti-Copy DRM Malware☆67Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 5 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- .NET deserialization hunter☆80Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated last year
- To audit the security of read-only domain controllers☆117Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆86Updated 7 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Updated last year
- ☆18Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- Lateral Movement☆124Updated last year
- Abuse leaked token handles.☆132Updated last year
- ☆137Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- A RunAs clone with the ability to specify the password as an argument.☆111Updated 2 years ago
- ☆192Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆147Updated last week
- ☆100Updated 2 years ago
- Execute commands in other Sessions☆89Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆120Updated 10 months ago
- ☆44Updated last month
- ☆81Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆120Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆26Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 8 months ago