jiushill / wmi-hack-pyLinks
☆49Updated 2 years ago
Alternatives and similar repositories for wmi-hack-py
Users that are interested in wmi-hack-py are comparing it to the libraries listed below
Sorting:
- Zerologon自动化脚本☆93Updated last year
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆89Updated last year
- Lsass memory dump.☆53Updated last year
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆78Updated 2 years ago
- 利用EFSRPC协议批量探测出网☆66Updated last year
- Cobalt Strike BOF that Add a user to localgroup by samr☆131Updated 2 years ago
- ☆34Updated 5 months ago
- 密码收集☆58Updated 3 years ago
- ad vulnerability scanner☆72Updated last year
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆104Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- 魔改shadowsocks,实现socks5内网穿透。☆62Updated last year
- mssqlproxy python3.5+ 并修复bug☆64Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆77Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆49Updated 2 years ago
- a 'pentest' udf plugin of MySQL.☆36Updated 3 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆151Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆16Updated 3 years ago
- ☆35Updated 2 years ago
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆110Updated last year
- Hidedump:a lsassdump tools that may bypass EDR☆51Updated last year
- Zerologon exploit with restore DC password automatically☆140Updated last year
- 通过C/C++实现的 Windows RID Hijacking persistence technique (RID劫持 影子账户 账户克隆).☆83Updated 3 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 4 months ago
- 主要用于隐藏进程真实路径,进程带windows真签名☆114Updated 10 months ago
- Loader Pre-Technology, Main thread hijacking without using API, get ntdll and kernel32 handle without peb. 加载器前置技术,不使用API进行主线程劫持,不使用PEB…☆80Updated 3 weeks ago