fashionproof / EnableAllTokenPrivs
☆70Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for EnableAllTokenPrivs
- SeRestorePrivilege to SYSTEM☆77Updated 3 years ago
- Payload Generation Framework☆85Updated 7 months ago
- ☆79Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆108Updated 4 years ago
- ☆198Updated last year
- A collection of code snippets built to assist with breaking chains.☆115Updated 6 months ago
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Precompiled executable☆37Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 2 months ago
- ☆150Updated 9 months ago
- SeManageVolumePrivilege to SYSTEM☆63Updated 11 months ago
- AV EVASION TECHNIQUES☆74Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆77Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆91Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆96Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆252Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Inject remote template link into word document for remote template injection☆159Updated 3 years ago
- CLI monitor for windows process- & file activity☆76Updated 3 years ago
- Make everyone in your VLAN ASRep roastable☆135Updated 4 months ago
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆74Updated 3 years ago
- ☆49Updated last year
- PowerShell Constrained Language Mode Bypass☆231Updated 3 years ago
- ☆181Updated 7 months ago
- ADCS abuser☆254Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- ☆112Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆228Updated last week
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆196Updated 10 months ago