xct / SeDebugAbuse
Get SYSTEM via SeDebugPrivilege
☆19Updated 2 years ago
Alternatives and similar repositories for SeDebugAbuse:
Users that are interested in SeDebugAbuse are comparing it to the libraries listed below
- ☆45Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆50Updated last year
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆31Updated 2 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- ☆29Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆89Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- ☆88Updated 2 years ago
- ☆26Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- ☆28Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆20Updated 2 weeks ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆79Updated 3 years ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆22Updated last year
- ☆61Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 4 months ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆50Updated 2 years ago
- ☆39Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 months ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago