This is the fastest way to get admin rights at work, school, etc., in just a few seconds.
☆92Jan 10, 2026Updated 3 months ago
Alternatives and similar repositories for adminexploit
Users that are interested in adminexploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility for running files/scripts/apps as Administrator☆13Nov 14, 2025Updated 5 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Me☆30Feb 11, 2023Updated 3 years ago
- Script to monitor pastebin.com's public pastes for sensitive data leakage☆31Dec 2, 2020Updated 5 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆15Mar 21, 2026Updated 3 weeks ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- UPDATED, GoGuardian and Securly or any School Blocker work-around!☆12Mar 9, 2026Updated last month
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Botnet targeting Windows machines 🐍☆48Feb 25, 2026Updated last month
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆30Dec 15, 2017Updated 8 years ago
- A FUD Rust Dropper☆15Feb 4, 2023Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- converts EXE (or other binary) files to VBS scripts☆24Oct 15, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Get admin on any windows computer in about 30 seconds☆28May 3, 2024Updated last year
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Jul 31, 2020Updated 5 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A bot which automates the process of finding betting odds by web scrapping and then calculates to see if there is an Arbitrage Opportunit…☆10Jul 1, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bypassing Discord's Limits, Download Below:☆24Sep 2, 2022Updated 3 years ago
- Crypter For Malware and Stealer☆33Apr 10, 2020Updated 6 years ago
- 🐳 Formation Docker - De débutant à intermédiaire | Guide progressif en français couvrant Docker Engine, Docker Compose, volumes, réseaux…☆26Mar 8, 2026Updated last month
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆13Jan 25, 2024Updated 2 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- 透過線上購物網站來實際操作來體驗 OWASP Top 10 各項資安問題☆11Nov 23, 2021Updated 4 years ago
- Discover how I configured Microsoft Server 2022 on a Virtual Machine for Active Directory, set up a Domain Controller, and created over 1…☆12Apr 8, 2024Updated 2 years ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.☆14Jul 7, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆39Feb 10, 2022Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- Find exploits in local and online database☆80Oct 3, 2024Updated last year
- steal cookie for chrome and mozilla firefox, use another extension to login with the cookie stealed☆33Mar 25, 2021Updated 5 years ago
- send me some eth, how bout dat?☆14Feb 17, 2019Updated 7 years ago