xct / SeManageVolumeAbuse
SeManageVolumePrivilege to SYSTEM
☆102Updated last year
Alternatives and similar repositories for SeManageVolumeAbuse:
Users that are interested in SeManageVolumeAbuse are comparing it to the libraries listed below
- SeRestorePrivilege to SYSTEM☆107Updated 3 years ago
- ☆111Updated last year
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- Precompiled executable☆53Updated 2 months ago
- ☆79Updated 5 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- Payload Generation Framework☆91Updated last year
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆206Updated 2 weeks ago
- rcat☆67Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆57Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆138Updated 8 months ago
- ☆32Updated 3 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- Code dump from PEN-300/OSEP updated 2022☆41Updated 2 years ago
- Patch AMSI and ETW☆237Updated 11 months ago
- A variety of AV evasion techniques written in C# for practice.☆89Updated 4 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆57Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 7 months ago
- ☆49Updated 2 years ago
- ☆69Updated last month
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆56Updated 3 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- ☆202Updated last year
- ☆117Updated last month
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆108Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆106Updated 2 years ago