securycore / Ikeext-Privesc
Windows IKEEXT DLL Hijacking Exploit Tool
☆33Updated 6 years ago
Alternatives and similar repositories for Ikeext-Privesc:
Users that are interested in Ikeext-Privesc are comparing it to the libraries listed below
- Some random tools I use for penetration testing☆88Updated last week
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆79Updated 3 years ago
- This code was used for the blogpost on secjuice.☆41Updated 5 years ago
- python spraying tools based on impacket lib☆52Updated 2 years ago
- Simple APPLocker bypass summary☆40Updated 6 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆50Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- ☆92Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- ☆68Updated 4 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 5 years ago
- Load C# Code straight to memory☆53Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆41Updated 3 years ago
- ☆125Updated last year
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆89Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆26Updated 2 years ago
- ☆45Updated 7 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- C# tool to discover low hanging fruits☆90Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆51Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆93Updated 2 years ago