evilashz / CVE-2021-1675-LPE-EXPLinks
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
☆59Updated 4 years ago
Alternatives and similar repositories for CVE-2021-1675-LPE-EXP
Users that are interested in CVE-2021-1675-LPE-EXP are comparing it to the libraries listed below
Sorting:
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- cmd2shellcode☆79Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- ShellCodeLoader via DInvoke☆58Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 3 years ago
- A simple hidden vnc.☆33Updated 4 years ago
- Load shellcode via syscall☆55Updated 4 years ago
- ☆101Updated 2 years ago
- ☆50Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- UAC_wenpon☆49Updated 3 years ago
- ☆91Updated 4 years ago
- c++ shellcode loader☆40Updated 2 years ago
- dump lsass☆37Updated 3 years ago
- dump lsass tool☆38Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆47Updated 3 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- ☆46Updated 4 years ago
- geacon for apt profile☆21Updated 2 years ago
- SystemGap - Maintenance Tools after privilege escalation☆41Updated last year
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago