newsoft / adduser
Programmatically create an administrative user under Windows
☆178Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for adduser
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆185Updated 3 years ago
- ☆184Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆188Updated last year
- NTDS.dit offline dumper with non-elevated☆211Updated 6 years ago
- Run shellcode from resource☆253Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆210Updated 4 years ago
- Cobalt Strike Aggressor Scripts☆139Updated 3 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆109Updated 4 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆258Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆213Updated last year
- Cobalt Strike Python API☆292Updated 2 years ago
- ☆157Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- Executes position independent shellcode from an encrypted zip☆300Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆266Updated last year
- Beacon Object File (BOF) Creation Helper☆221Updated 2 years ago
- ☆289Updated 4 months ago
- Run Rubeus via Rundll32☆198Updated 4 years ago
- Various Aggressor Scripts I've Created.☆147Updated 2 years ago
- a patched sshd for red team activities☆80Updated 3 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆124Updated last year
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆316Updated 5 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆143Updated 4 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆322Updated 2 years ago
- CVE-2018-8581☆370Updated 2 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆175Updated 2 months ago
- ☆378Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆206Updated 2 years ago