xct / SeManageVolumeAbuse
SeManageVolumePrivilege to SYSTEM
☆87Updated last year
Alternatives and similar repositories for SeManageVolumeAbuse:
Users that are interested in SeManageVolumeAbuse are comparing it to the libraries listed below
- SeRestorePrivilege to SYSTEM☆90Updated 3 years ago
- ☆99Updated last year
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- Payload Generation Framework☆89Updated 11 months ago
- ☆57Updated last year
- CLI monitor for windows process- & file activity☆81Updated 4 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- A collection of code snippets built to assist with breaking chains.☆116Updated 9 months ago
- ☆31Updated 3 years ago
- ☆73Updated 5 years ago
- rcat☆67Updated 2 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆54Updated 2 years ago
- ☆45Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- ☆29Updated 5 months ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆107Updated 3 weeks ago
- Get SYSTEM via SeDebugPrivilege☆19Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆185Updated 4 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆55Updated 2 years ago
- ☆113Updated last year
- ☆79Updated last month
- ☆192Updated 10 months ago
- Precompiled executable☆42Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆84Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- AV EVASION TECHNIQUES☆76Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year