decoder-it / NetworkServiceExploitLinks
POC for NetworkService PrivEsc
☆126Updated 5 years ago
Alternatives and similar repositories for NetworkServiceExploit
Users that are interested in NetworkServiceExploit are comparing it to the libraries listed below
Sorting:
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆136Updated last year
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- MSBuild without MSbuild.exe☆133Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆120Updated 6 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 6 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- WMI Event Subscription Persistence in C#☆112Updated 6 years ago
- ☆114Updated 5 years ago
- ☆96Updated 4 years ago
- Shellcode injector using direct syscalls☆123Updated 5 years ago
- Port of Invoke-Excel4DCOM☆104Updated 6 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆119Updated 5 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆61Updated 6 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- CSHARP DCOM Fun☆135Updated 6 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- MSBuild Without MSBuild.exe☆154Updated 4 years ago
- Various Aggressor Scripts I've Created.☆151Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆123Updated 4 years ago
- Spray a hash via smb to check for local administrator access☆142Updated 4 years ago
- ☆38Updated 5 years ago