magnusstubman / tokenduplicatorView external linksLinks
Tool to start processes as SYSTEM using token duplication
☆38Oct 27, 2020Updated 5 years ago
Alternatives and similar repositories for tokenduplicator
Users that are interested in tokenduplicator are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- It stinks☆105Apr 22, 2022Updated 3 years ago
- ☆138Aug 2, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- ☆24May 28, 2021Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- ☆88Jul 31, 2022Updated 3 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆152Nov 21, 2021Updated 4 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- A robust Red Team proxy written in Go.☆165Dec 26, 2021Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆73Oct 31, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Dec 10, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- ☆184Jul 2, 2022Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago