cfalta / MicrosoftWontFixList
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
☆950Updated 3 years ago
Alternatives and similar repositories for MicrosoftWontFixList:
Users that are interested in MicrosoftWontFixList are comparing it to the libraries listed below
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆748Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,381Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,580Updated 2 years ago
- An introduction to Active Directory security☆644Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,113Updated 5 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,484Updated last year
- Extract credentials from lsass remotely☆2,103Updated 3 months ago
- Adversary Tactics - PowerShell Training☆1,538Updated 5 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,167Updated 5 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,050Updated 3 years ago
- ☆1,581Updated last week
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆706Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,523Updated 4 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,304Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,090Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆535Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,602Updated 2 years ago
- Microsoft signed ActiveDirectory PowerShell module☆895Updated 5 years ago
- Some notes and examples for cobalt strike's functionality☆1,054Updated 3 years ago
- A tool to kill antimalware protected processes☆1,435Updated 3 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,223Updated 4 years ago
- Active Directory certificate abuse.☆1,644Updated 8 months ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated 11 months ago
- Also known by Microsoft as Knifecoat☆1,131Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆619Updated 10 months ago
- "Golden" certificates☆673Updated 8 months ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆611Updated 2 years ago
- The swiss army knife of LSASS dumping☆1,918Updated 7 months ago
- Hide your payload in DNS☆613Updated last year
- ☆2,081Updated 2 years ago