This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate and use whatever token present at any process
☆57Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for StealAllTokens
Users that are interested in StealAllTokens are comparing it to the libraries listed below
Sorting:
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- ☆81Feb 12, 2022Updated 4 years ago
- bypass UAC even when configured to always notify user☆29Aug 31, 2021Updated 4 years ago
- Leaked Windows processes handles identification tool☆291Mar 14, 2022Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Mar 3, 2022Updated 4 years ago
- Stop Windows Defender programmatically☆995Nov 4, 2022Updated 3 years ago
- ☆21Mar 16, 2021Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Post-exploitation script developed using impacket☆21Mar 15, 2022Updated 3 years ago
- Add an empty section to a PE file☆53Aug 8, 2017Updated 8 years ago
- Search files for extensions as well as text within.☆121Sep 28, 2021Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- ☆46Jun 25, 2024Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- 自不量力的mimikatz分离计划☆44Nov 28, 2021Updated 4 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Oct 12, 2022Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- A simple program to obfuscate code written in cpp.☆51May 9, 2024Updated last year
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆11Oct 28, 2021Updated 4 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Jun 7, 2021Updated 4 years ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆454Mar 8, 2023Updated 2 years ago
- 与反病毒软件老大哥们的打闹日常☆13Nov 8, 2018Updated 7 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- 提取DC日志,快速获取域用户对应IP地址☆308Mar 21, 2022Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- ☆14Jul 10, 2025Updated 7 months ago
- ☆14Sep 2, 2021Updated 4 years ago
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆142May 5, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago