lz520520 / mimikatz
A little tool to play with Windows security
☆12Updated last year
Alternatives and similar repositories for mimikatz:
Users that are interested in mimikatz are comparing it to the libraries listed below
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆43Updated last year
- ☆34Updated 2 months ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- ☆18Updated 3 years ago
- ☆10Updated last year
- command execute without 445 port☆52Updated 3 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆73Updated last year
- 一个demo☆25Updated last year
- Rust 重构的 sRDI☆14Updated 8 months ago
- Golang implement winrm client with pass the hash☆31Updated last year
- tsh多终端代理通信☆18Updated 2 months ago
- ☆19Updated last year
- ☆17Updated last year
- ☆23Updated 2 weeks ago
- 重构Beacon☆15Updated 8 months ago
- 利用EFSRPC协议批量探测出网☆65Updated last year
- AddDefenderExclusions Beacon Object File☆37Updated last year
- 通过ptr记录使用ip反查内网域名☆16Updated 8 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated 11 months ago
- c/s网络准入平台☆20Updated 2 years ago
- MSSQL CLR for pentest.☆53Updated last year
- ☆30Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆45Updated 2 years ago
- Self Cleanup in post-ex job☆55Updated 8 months ago
- ☆31Updated last year
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆16Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆23Updated 4 years ago
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆38Updated 7 months ago
- ☆40Updated last year
- query specific user and login IP from remote machine☆17Updated 2 years ago