k4sth4 / SeLoadDriverPrivilegeLinks
Windows Privilege Escalation
☆22Updated 3 years ago
Alternatives and similar repositories for SeLoadDriverPrivilege
Users that are interested in SeLoadDriverPrivilege are comparing it to the libraries listed below
Sorting:
- ☆35Updated 4 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- AV Evasion Techniques☆82Updated 3 years ago
- ☆75Updated 9 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆46Updated 5 months ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆92Updated this week
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- ☆94Updated 11 months ago
- SeManageVolumePrivilege to SYSTEM☆142Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆238Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 2 months ago
- ☆18Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- Precompiled binaries for various projects☆12Updated 5 years ago
- ☆62Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- ☆102Updated 6 years ago
- Evasive Golang Loader☆137Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆76Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆114Updated 3 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆231Updated 10 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆26Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆229Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Updated 2 years ago
- ☆233Updated last year
- Payload Generation Framework☆98Updated last year