Windows Privilege Escalation
☆24Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for SeLoadDriverPrivilege
Users that are interested in SeLoadDriverPrivilege are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Windows Privilege Escalation☆51Jun 8, 2022Updated 3 years ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 11 months ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆54Mar 6, 2026Updated 2 months ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Precompiled binaries for various projects☆14Nov 6, 2020Updated 5 years ago
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 11 months ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- My Favorite Offensive Security Scripts☆89Apr 25, 2025Updated last year
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆48Feb 19, 2026Updated 3 months ago
- 本工具不去主动的做端口扫描,通过聚合了三大资产测绘引擎接口语法,快速获取与目标有关的所有资产列表,并进行一键指纹识别(通用系统指纹、ICP归属等),筛出高价值及脆弱资产。☆31Mar 13, 2025Updated last year
- Code that allows running another windows PE in the same address space as the host process.☆10Nov 19, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Load PE via XML Attribute☆31Feb 1, 2020Updated 6 years ago
- ☆10Jul 19, 2016Updated 9 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- Fine-tune BERT models to classify Arabic text by different dialects.☆19Aug 8, 2023Updated 2 years ago
- Anti-Virus software based on Qt Quick and ClamAV -- 基于QtQuick和ClamAV的杀毒软件☆12Oct 21, 2019Updated 6 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- ☆26Dec 23, 2023Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Jan 20, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆39Feb 18, 2020Updated 6 years ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆327Sep 30, 2025Updated 7 months ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated 2 years ago
- Windows Privilege Escalation☆108Aug 16, 2024Updated last year
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- 力扣笔记☆14Oct 19, 2021Updated 4 years ago
- ☆25Feb 18, 2025Updated last year
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆130May 5, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Jun 1, 2019Updated 6 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated 3 months ago
- draw rect in float view☆18Feb 7, 2022Updated 4 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Testing tools for Oracle Forms☆13Oct 23, 2025Updated 6 months ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago