☆116Dec 13, 2019Updated 6 years ago
Alternatives and similar repositories for EnableAllTokenPrivs
Users that are interested in EnableAllTokenPrivs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆166Jun 14, 2018Updated 7 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆445Jul 29, 2013Updated 12 years ago
- getsystem via parent process using ps1 & embeded c#☆481Oct 26, 2023Updated 2 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆29Feb 27, 2023Updated 3 years ago
- Joomla login bruteforce☆118Jul 18, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tools for Kerberos PKINIT and relaying to AD CS☆896Jan 3, 2025Updated last year
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆960Apr 20, 2022Updated 4 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- SharpUp is a C# port of various PowerUp functionality.☆1,487Feb 14, 2024Updated 2 years ago
- Capcom Rootkit POC☆213Mar 5, 2017Updated 9 years ago
- ☆199Jan 12, 2026Updated 3 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,170Jan 9, 2021Updated 5 years ago
- ☆299Jan 7, 2015Updated 11 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆139Aug 20, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ADCS abuser☆319Feb 6, 2023Updated 3 years ago
- Python script to decrypt passwords stored by mRemoteNG☆179Jul 6, 2023Updated 2 years ago
- Extracts Key Values from .keytab files☆357Aug 26, 2020Updated 5 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆912Mar 25, 2026Updated last month
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,377Jul 12, 2024Updated last year
- GitLab User Enumeration☆62Jan 3, 2025Updated last year
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆156Apr 20, 2022Updated 4 years ago
- Active Directory Integrated DNS dumping by any authenticated user☆1,159Apr 4, 2025Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,313Feb 16, 2026Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆598Oct 19, 2023Updated 2 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆86Feb 21, 2019Updated 7 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆35Jun 24, 2020Updated 5 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,812Feb 27, 2026Updated 2 months ago
- Kerberoast with ACL abuse capabilities☆643Dec 16, 2024Updated last year
- Tunnel TCP connections through ICMP.☆577Nov 27, 2024Updated last year
- A wordlist repository with human-curated and reviewed content.☆129Oct 24, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,951Nov 19, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Username tools for penetration testing☆1,377Sep 20, 2024Updated last year
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,240Sep 10, 2020Updated 5 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆396Mar 25, 2021Updated 5 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,413Jun 27, 2024Updated last year
- C# implementation of harmj0y's PowerView☆49Mar 22, 2020Updated 6 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,589Mar 11, 2026Updated last month