jiushill / wmi-hack-pyLinks
☆49Updated 2 years ago
Alternatives and similar repositories for wmi-hack-py
Users that are interested in wmi-hack-py are comparing it to the libraries listed below
Sorting:
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆89Updated last year
- ☆34Updated 7 months ago
- 利用EFSRPC协议批量探测出网☆65Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆131Updated 2 years ago
- Zerologon自动化脚本☆96Updated 2 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆77Updated 2 years ago
- Lsass memory dump.☆53Updated last year
- 密码收集☆58Updated 3 years ago
- command execute without 445 port☆52Updated 3 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆102Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated 2 years ago
- 魔改shadowsocks,实现socks5内网穿透。☆62Updated last year
- Cobalt Strike BOF that Add an admin user☆78Updated 3 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- ad vulnerability scanner☆73Updated last year
- mssqlproxy python3.5+ 并修复bug☆64Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- CVE-2020-1472 C++☆83Updated 3 years ago
- Hidedump:a lsassdump tools that may bypass EDR☆50Updated last year
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆38Updated last year
- Loader Pre-Technology, Main thread hijacking without using API, get ntdll and kernel32 handle without peb. 加载器前置技术,不使用API进行主线程劫持,不使用PEB…☆81Updated 2 months ago
- ☆37Updated 2 years ago
- Zerologon exploit with restore DC password automatically☆140Updated last year
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 6 months ago
- ☆93Updated 2 years ago
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆109Updated 2 years ago
- kill windows log☆44Updated last year
- 通过C/C++实现的 Windows RID Hijacking persistence technique (RID劫持 影子账户 账户克隆).☆84Updated 3 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆151Updated 2 years ago
- If you only have hash, you can still operate exchange☆77Updated 4 years ago