evilashz / CVE-2021-1675-LPE-EXP
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
☆58Updated 3 years ago
Alternatives and similar repositories for CVE-2021-1675-LPE-EXP:
Users that are interested in CVE-2021-1675-LPE-EXP are comparing it to the libraries listed below
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- CVE-2020-1472 C++☆81Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- Load shellcode via syscall☆47Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- Re-implement cmd.exe using windows api☆48Updated 2 years ago
- ☆100Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆75Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- geacon for apt profile☆21Updated 2 years ago
- ShellCodeLoader via DInvoke☆55Updated 3 years ago
- ☆48Updated 3 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- c++ shellcode loader☆40Updated 2 years ago
- Bypass cobaltstrike beacon config scan☆82Updated 3 years ago
- dump lsass☆37Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆60Updated 9 months ago
- An EternalBlue exploit implementation in pure go☆95Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- resource-based constrained delegation RBCD☆43Updated 3 years ago
- ☆46Updated 3 years ago
- ☆91Updated 3 years ago
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆72Updated 2 years ago
- Dumping Windows Local Credentials Tools/Tricks☆68Updated 5 years ago
- ☆75Updated 3 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago