evilashz / CVE-2021-1675-LPE-EXPView external linksLinks
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
☆58Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-1675-LPE-EXP
Users that are interested in CVE-2021-1675-LPE-EXP are comparing it to the libraries listed below
Sorting:
- golang implementation of Syswhisper2/Syswhisper3☆23Mar 23, 2022Updated 3 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Bringing Shikata ga nai to the front html☆23Apr 28, 2022Updated 3 years ago
- Yapi RCE漏洞批量验证与伪交互SHELL☆42Jul 9, 2021Updated 4 years ago
- Reflective DLL injection Execution☆20Sep 9, 2022Updated 3 years ago
- 防火墙出网探测工具,内网穿透型socks5代理☆270Nov 12, 2021Updated 4 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- 火刃 - 轻量级的,多功能的,联合xray、物联网引擎的全自动广域队列扫描器☆28Mar 7, 2022Updated 3 years ago
- 优化了GetSystemEarlyBird的代码结构☆21Jun 24, 2020Updated 5 years ago
- 适用于Cobalt Strike的插件☆562May 30, 2021Updated 4 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- CrossC2通信协议API实现☆84Jul 26, 2021Updated 4 years ago
- 利用白名单文件 cdb.exe 执行 shellcode☆215Jun 29, 2022Updated 3 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆108Jan 8, 2021Updated 5 years ago
- enc8 密码碰撞脚本☆33Jan 31, 2023Updated 3 years ago
- 这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。☆638Apr 4, 2021Updated 4 years ago
- 提取DC日志,快速获取域用户对应IP地址☆308Mar 21, 2022Updated 3 years ago
- geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.☆161Aug 3, 2022Updated 3 years ago
- 针对于Jenkins控制台用户的暴力破解工具☆33Jan 12, 2021Updated 5 years ago
- Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit☆11Sep 21, 2021Updated 4 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- Windows NTLMSSP library☆11Oct 13, 2020Updated 5 years ago
- Load shellcode via syscall☆56Jul 28, 2021Updated 4 years ago
- cve-2021-21985 exploit☆115Jan 10, 2022Updated 4 years ago
- A Builder for Binding EvilFile and Normal File with auto release☆176Sep 29, 2021Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆343Apr 10, 2022Updated 3 years ago
- dump lsass☆37May 24, 2022Updated 3 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆152Nov 21, 2021Updated 4 years ago
- CVE-2022-0185 POC and Docker and Analysis write up☆38May 24, 2022Updated 3 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- 杂 物 收 纳☆15Aug 4, 2023Updated 2 years ago
- echoes(回响)是一款Github,红队监测工具☆14Mar 31, 2022Updated 3 years ago
- Token stealing tool written by Go. Bypass Kaspersky,Defender,Avira, etc./Go 编写的 Token 窃取工具。免杀卡巴、Defender、小红伞等杀软☆188Jan 16, 2025Updated last year
- 通过WindowsAPI获取用户凭证,并保存到文件中☆195Jun 18, 2024Updated last year
- ☆33Aug 15, 2022Updated 3 years ago
- CVE-2020-1472 C++☆84Sep 2, 2022Updated 3 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago