numanturle / PrintNightmare
☆63Updated 2 years ago
Alternatives and similar repositories for PrintNightmare:
Users that are interested in PrintNightmare are comparing it to the libraries listed below
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- lpe poc for cve-2022-21882☆49Updated 2 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- Research project for understanding how Mimikatz work and become better at C☆117Updated 3 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆122Updated 2 years ago
- Simple DLL that add a user to the local Administrators group☆77Updated 3 years ago
- nuke that event log using some epic dinvoke fu☆116Updated 3 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆59Updated 2 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- .NET project for installing Persistence☆64Updated 2 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆105Updated 3 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- AutoStart teamserver and listeners with services☆71Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆87Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆74Updated 4 years ago
- Checks for signature requirements over LDAP☆95Updated 2 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆93Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- ☆37Updated 4 years ago
- My CobaltStrike BOFS☆160Updated 2 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆84Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year