returnvar / wce
Windows Credentials Editor v1.3beta
☆107Updated 5 years ago
Alternatives and similar repositories for wce:
Users that are interested in wce are comparing it to the libraries listed below
- Programmatically create an administrative user under Windows☆180Updated 8 years ago
- Run Rubeus via Rundll32☆199Updated 4 years ago
- Example DLL to load from Windows NetShell☆180Updated 8 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆115Updated 5 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆149Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆62Updated 6 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆216Updated 5 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆172Updated 5 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆200Updated 4 years ago
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- Cobalt Strike Python API☆298Updated 3 years ago
- ☆157Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆217Updated 4 years ago
- Impersonating authentication over HTTP and/or named pipes.☆130Updated 4 years ago
- Create a minidump of the LSASS process from memory☆259Updated 2 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Proof-of-concept code for various bugs☆109Updated 5 months ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆303Updated 3 years ago
- ☆187Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆220Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆231Updated 2 years ago
- Cobalt Strike Aggressor Scripts☆141Updated 4 months ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆262Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆325Updated 5 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆208Updated 3 years ago
- POC for NetworkService PrivEsc☆125Updated 4 years ago
- Proof-of-concept tools for my AD Forest trust research☆208Updated 9 months ago