k4sth4 / SeLoadDriverPrivilege
Windows Privilege Escalation
☆16Updated 2 years ago
Alternatives and similar repositories for SeLoadDriverPrivilege:
Users that are interested in SeLoadDriverPrivilege are comparing it to the libraries listed below
- ☆15Updated 4 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆73Updated 7 months ago
- ☆83Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- List of some AD tools I frequently use☆45Updated 2 months ago
- Lateral Movement☆122Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆97Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆48Updated 2 years ago
- ☆83Updated 2 months ago
- ☆86Updated last year
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- .bin file to shellcode convertor☆34Updated 9 months ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- ☆38Updated this week
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆90Updated 2 weeks ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆113Updated last year
- ☆31Updated 3 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆198Updated 6 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆204Updated last year
- ☆67Updated last month
- ☆69Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆124Updated 3 weeks ago