k4sth4 / SeLoadDriverPrivilegeLinks
Windows Privilege Escalation
☆22Updated 3 years ago
Alternatives and similar repositories for SeLoadDriverPrivilege
Users that are interested in SeLoadDriverPrivilege are comparing it to the libraries listed below
Sorting:
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆47Updated 6 months ago
- ☆39Updated 4 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆141Updated 2 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- ☆75Updated 10 months ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆26Updated last year
- ☆94Updated last year
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆97Updated last month
- Attempt at Obfuscated version of SharpCollection☆242Updated 2 months ago
- ☆18Updated last year
- SeManageVolumePrivilege to SYSTEM☆146Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- ☆235Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 6 months ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆234Updated 11 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Updated last year
- AV Evasion Techniques☆83Updated 3 years ago
- rcat☆75Updated 3 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 9 months ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆213Updated last year
- Payload Generation Framework☆98Updated last year
- ☆63Updated 2 years ago
- The DCERPC only printerbug.py version☆200Updated 3 months ago
- Evasive Golang Loader☆137Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆229Updated last year