gyaansastra / Print-Nightmare-LPELinks
☆19Updated 3 years ago
Alternatives and similar repositories for Print-Nightmare-LPE
Users that are interested in Print-Nightmare-LPE are comparing it to the libraries listed below
Sorting:
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆19Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆20Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 6 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆37Updated 7 years ago
- ☆37Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆17Updated 4 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- ☆41Updated 6 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Updated last year
- ☆26Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago