bugch3ck / SharpEfsPotatoLinks
Local privilege escalation from SeImpersonatePrivilege using EfsRpc.
☆335Updated 3 years ago
Alternatives and similar repositories for SharpEfsPotato
Users that are interested in SharpEfsPotato are comparing it to the libraries listed below
Sorting:
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆437Updated last year
- Powershell Mimikatz Loader☆70Updated last year
- Python implementation for PetitPotam☆218Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆303Updated 4 years ago
- 🍊 Orange Tsai EventViewer RCE☆194Updated 3 years ago
- Precompiled executable☆61Updated 10 months ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆285Updated 4 years ago
- Attempt at Obfuscated version of SharpCollection☆238Updated last month
- Creating a repository with all public Beacon Object Files (BoFs)☆560Updated 2 years ago
- Collection of remote authentication triggers in C#☆523Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆564Updated 2 years ago
- AD ACL abuse☆378Updated 4 months ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆504Updated 7 months ago
- Fileless atexec, no more need for port 445☆404Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆401Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆299Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆525Updated last month
- ☆172Updated 2 years ago
- ☆477Updated 3 years ago
- Shellcode launcher for AV bypass☆216Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆249Updated last month
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆76Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆583Updated last year
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆204Updated 4 years ago
- COM Hijacking VOODOO☆367Updated last month
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆531Updated last month
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆443Updated last year