jas502n / mimikat_ssp
Security Support Provider Interface
☆46Updated 4 years ago
Alternatives and similar repositories for mimikat_ssp:
Users that are interested in mimikat_ssp are comparing it to the libraries listed below
- ☆38Updated 7 years ago
- CVE-2021-1675 (PrintNightmare)☆75Updated 3 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆79Updated 4 years ago
- CVE-2021-26855 & CVE-2021-27065☆27Updated 3 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆57Updated 7 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 2 years ago
- proxylogon exploit - CVE-2021-26857☆112Updated 3 years ago
- my learning case about windows☆21Updated 2 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- just test☆65Updated 2 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 4 years ago
- Play Doh Windows ACL Tools☆60Updated 2 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆34Updated 7 months ago
- ☆73Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 3 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆93Updated 4 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- Exchange2010 authorized RCE☆155Updated 4 years ago