This is the fastest way to get admin rights at work, school, etc., in just a few seconds.
β91Jan 10, 2026Updated 3 months ago
Alternatives and similar repositories for adminexploit
Users that are interested in adminexploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to monitor pastebin.com's public pastes for sensitive data leakageβ31Dec 2, 2020Updated 5 years ago
- π Builder of Malware Loaderβ12Nov 12, 2020Updated 5 years ago
- UPDATED, GoGuardian and Securly or any School Blocker work-around!β11Mar 9, 2026Updated last month
- Botnet targeting Windows machines πβ48Feb 25, 2026Updated 2 months ago
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloaderβ31Dec 15, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A FUD Rust Dropperβ15Feb 4, 2023Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalitiesβ10Feb 16, 2021Updated 5 years ago
- converts EXE (or other binary) files to VBS scriptsβ24Oct 15, 2012Updated 13 years ago
- Spider or repeater to find all links.β10Feb 7, 2021Updated 5 years ago
- Tiny read-only unlocker for MS Office documentsβ12Aug 18, 2021Updated 4 years ago
- An UWP app to consult Classeviva's websiteβ12Feb 1, 2026Updated 3 months ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chanβ¦β11Dec 20, 2021Updated 4 years ago
- π Reverse shell written on python3β14Dec 12, 2020Updated 5 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variablesβ35Jul 12, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- Bypassing Discord's Limits, Download Below:β24Sep 2, 2022Updated 3 years ago
- A python application to steal chrome data and push it back to you.β19May 10, 2020Updated 5 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacksβ13Jan 25, 2024Updated 2 years ago
- Ransomware programado en Pythonβ10Oct 8, 2020Updated 5 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.β11Apr 21, 2021Updated 5 years ago
- 1secmail disposable temp mail service from terminalβ12Dec 5, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.β15Aug 2, 2021Updated 4 years ago
- Powershell UAC Bypass script leveraging WinSAT.exeβ16Dec 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.β14Jul 7, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.β40Feb 10, 2022Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlersβ17Jul 12, 2021Updated 4 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chainβ28Apr 16, 2026Updated 2 weeks ago
- PHP email spoofer | Send emails from any email adressβ82Apr 26, 2020Updated 6 years ago
- Keylogger that sends Email at a specific timeβ10Apr 7, 2018Updated 8 years ago
- DEPRECATED: Tool for checking data leaks of social media platformsβ10Feb 20, 2022Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.β25Jan 1, 2021Updated 5 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover tβ¦β10Mar 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Perintah : $pkg update && pkg upgrade $pkg install python2 $pkg install git $git clone https://github.com/spider-fb/spider-fb $pip2 β¦β10Jul 10, 2020Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.β24Apr 16, 2021Updated 5 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see hβ¦β22Dec 24, 2023Updated 2 years ago
- This tool is great for information gathering and post- exploitationβ16Jul 20, 2021Updated 4 years ago
- PiWiFiAP is a .NET 10 solution for Raspberry Pi that enables users to easily configure WiFi via an AP hotspot and QR code. When offline, β¦β19Apr 1, 2026Updated last month
- β21Apr 24, 2026Updated last week
- Bypassing windows uac, however its an old approach/method but its still unpatched Β―\_(γ)_/Β―β44Nov 17, 2021Updated 4 years ago