c3c / CVE-2021-4034Links
Pre-compiled builds for CVE-2021-4034
☆26Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆22Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆126Updated last year
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆58Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆116Updated 3 years ago
- ☆70Updated 3 months ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 3 years ago
- rcat☆68Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆59Updated 5 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆60Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated last year
- python spraying tools based on impacket lib☆53Updated 2 years ago
- ☆90Updated 4 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆110Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆84Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- ☆52Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 5 months ago
- ☆58Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆102Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Loads a custom dll in system32 via diaghub.☆76Updated 5 years ago
- Payload Generation Framework☆14Updated 8 months ago
- ☆72Updated last year
- ☆29Updated 2 years ago