ly4k / PrintNightmareLinks
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
☆187Updated 3 years ago
Alternatives and similar repositories for PrintNightmare
Users that are interested in PrintNightmare are comparing it to the libraries listed below
Sorting:
- Python implementation for PetitPotam☆200Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆291Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- Proof-of-concept tools for my AD Forest trust research☆214Updated 11 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- ☆388Updated 4 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆229Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆298Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆277Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆279Updated 7 months ago
- Shellcode launcher for AV bypass☆215Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆328Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- ☆219Updated 2 years ago
- ☆456Updated 2 years ago
- Impersonating authentication over HTTP and/or named pipes.☆134Updated 4 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆277Updated 2 years ago
- ADCS abuser☆287Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆322Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆215Updated 2 months ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆182Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆415Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago