termanix / TokenElevation
Token Elevation to authorized user as SYSTEM or Domain Admins
☆23Updated last year
Alternatives and similar repositories for TokenElevation:
Users that are interested in TokenElevation are comparing it to the libraries listed below
- ☆59Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆79Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆27Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- ☆57Updated 3 years ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆48Updated last year
- Small project to facilitate creation of .lnk payloads☆65Updated 2 years ago
- Rewrite to fit my needs☆27Updated 8 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Python module for running BOFs☆70Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated last month
- A pure C version of SymProcAddress☆26Updated last year
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆21Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Cortex EDR Ransomware protection Bypass☆20Updated last month
- Determine if the WebClient Service (WebDAV) is running on a remote system☆18Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago