fashionproof / EnableAllTokenPrivsLinks
☆85Updated 5 years ago
Alternatives and similar repositories for EnableAllTokenPrivs
Users that are interested in EnableAllTokenPrivs are comparing it to the libraries listed below
Sorting:
- Payload Generation Framework☆91Updated last year
- Precompiled executable☆59Updated 4 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- Powershell version of SharpGPOAbuse☆80Updated 4 years ago
- Identifies the bytes that Microsoft Defender flags on.☆88Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- ☆141Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆58Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆107Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆74Updated 10 months ago
- Make everyone in your VLAN ASRep roastable☆199Updated 4 months ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆35Updated last month
- ☆34Updated 3 years ago
- ☆225Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆117Updated 3 years ago
- 🍊 Orange Tsai EventViewer RCE☆187Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆283Updated 5 months ago
- Attempt at Obfuscated version of SharpCollection☆216Updated last month
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆250Updated 2 months ago
- Inject remote template link into word document for remote template injection☆179Updated 4 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆250Updated last year
- SeManageVolumePrivilege to SYSTEM☆126Updated last year
- ADCS abuser☆293Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆92Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆162Updated 2 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆85Updated 3 years ago