Enable or Disable TokenPrivilege(s)
☆15May 17, 2024Updated last year
Alternatives and similar repositories for EnableAllTokenPrivs
Users that are interested in EnableAllTokenPrivs are comparing it to the libraries listed below
Sorting:
- ☆26Mar 11, 2025Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- ☆15Jun 27, 2024Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- ☆41Feb 20, 2025Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆31May 16, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- ☆29Sep 4, 2024Updated last year
- Test AMSI Provider implementation in C#☆42Dec 18, 2024Updated last year
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- A persistent database + CLI for your BBOT scan data 🧡☆42Mar 12, 2026Updated last week
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆139Jul 2, 2025Updated 8 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago