SeManageVolumePrivilege to SYSTEM
☆145Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for SeManageVolumeAbuse
Users that are interested in SeManageVolumeAbuse are comparing it to the libraries listed below
Sorting:
- SeRestorePrivilege to SYSTEM☆135Oct 8, 2021Updated 4 years ago
- ☆181May 29, 2023Updated 2 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆429Jul 29, 2013Updated 12 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆166Sep 13, 2021Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆939Nov 12, 2022Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138May 30, 2022Updated 3 years ago
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- UAC Bypass using UIAccess program QuickAssist☆213Nov 30, 2025Updated 3 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆674May 3, 2020Updated 5 years ago
- Windows Local Privilege Escalation from Service Account to System☆914Feb 23, 2020Updated 6 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆277Apr 17, 2023Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆20Jul 18, 2023Updated 2 years ago
- ☆254Feb 17, 2023Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆246May 10, 2022Updated 3 years ago
- A Beacon Object File (BOF) template for Visual Studio☆269Nov 24, 2025Updated 3 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Performing Indirect Clean Syscalls☆605Apr 19, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,155Jan 9, 2021Updated 5 years ago
- rcat☆74Mar 7, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,350Sep 22, 2025Updated 5 months ago
- spoof return address☆79Apr 28, 2023Updated 2 years ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆779Jan 26, 2026Updated last month
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆339Mar 30, 2022Updated 3 years ago
- vulnerable windows binaries for exploitation practice☆48Jun 6, 2022Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆968Dec 29, 2017Updated 8 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆137Aug 31, 2025Updated 6 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆614Aug 15, 2025Updated 6 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆141Sep 4, 2023Updated 2 years ago