Get SYSTEM via SeDebugPrivilege
☆24Jun 6, 2022Updated 3 years ago
Alternatives and similar repositories for SeDebugAbuse
Users that are interested in SeDebugAbuse are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆150Nov 22, 2023Updated 2 years ago
- rcat☆74Mar 7, 2022Updated 4 years ago
- SeRestorePrivilege to SYSTEM☆135Oct 8, 2021Updated 4 years ago
- generate payloads that force authentication against an attacker machine☆119Nov 6, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- Library for reading and writing dex files☆26Mar 14, 2026Updated last week
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆30Feb 12, 2024Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆109May 19, 2022Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- A Python based ingestor for BloodHound☆85Sep 26, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆154Aug 2, 2023Updated 2 years ago
- ☆40Jan 30, 2023Updated 3 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- A great tool for solving SVG type captchas using python☆14Mar 29, 2024Updated last year
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Shellcode execution for memflow☆13Apr 11, 2022Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- Simple PoC package for testing for dependency confusion vulnerabilities.☆10Feb 9, 2021Updated 5 years ago
- LPE exploit for CVE-2023-36802☆24Oct 10, 2023Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago