xct / SeManageVolumeAbuseLinks
SeManageVolumePrivilege to SYSTEM
☆140Updated 2 years ago
Alternatives and similar repositories for SeManageVolumeAbuse
Users that are interested in SeManageVolumeAbuse are comparing it to the libraries listed below
Sorting:
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- ☆171Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- Attempt at Obfuscated version of SharpCollection☆236Updated last month
- AV Evasion Techniques☆82Updated 3 years ago
- ☆100Updated 6 years ago
- CLI monitor for windows process- & file activity☆95Updated 5 years ago
- rcat☆73Updated 3 years ago
- Payload Generation Framework☆97Updated last year
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- ☆62Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆229Updated 10 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆136Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- Patch AMSI and ETW☆249Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆62Updated 3 years ago
- ☆35Updated 4 years ago
- generate payloads that force authentication against an attacker machine☆116Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆300Updated this week
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Precompiled executable☆61Updated 10 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆272Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated last month
- 🍊 Orange Tsai EventViewer RCE☆192Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆129Updated 2 years ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆90Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆181Updated last month
- ☆215Updated last year