evilashz / CVE-2021-1675-LPE-EXP
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
☆57Updated 3 years ago
Related projects: ⓘ
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆59Updated last year
- cmd2shellcode☆78Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆55Updated 2 years ago
- ☆98Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- Load shellcode via syscall☆47Updated 3 years ago
- ☆29Updated this week
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- dump lsass☆35Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated last year
- A simple hidden vnc.☆31Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated last year
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆29Updated 2 years ago
- ☆68Updated this week
- Re-implement cmd.exe using windows api☆49Updated last year
- resource-based constrained delegation RBCD☆41Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆73Updated 3 years ago
- MS17-010 scanner / exploit☆12Updated 4 years ago
- CrackMapExec extension module/protocol support☆40Updated last year
- geacon for apt profile☆20Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- dump lsass tool☆39Updated last year
- ☆93Updated this week
- ☆46Updated 3 years ago
- CobaltStrike and Google Auth twice☆64Updated 2 years ago
- ReturnGate, just like HellsGate.☆65Updated 2 years ago
- ☆20Updated 9 months ago
- UAC_wenpon☆48Updated 2 years ago
- Csharp 反射加载dll☆39Updated 3 years ago