xct / SeManageVolumeAbuseLinks
SeManageVolumePrivilege to SYSTEM
☆144Updated 2 years ago
Alternatives and similar repositories for SeManageVolumeAbuse
Users that are interested in SeManageVolumeAbuse are comparing it to the libraries listed below
Sorting:
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- ☆172Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆238Updated 2 months ago
- rcat☆75Updated 3 years ago
- ☆102Updated 6 years ago
- CLI monitor for windows process- & file activity☆95Updated 5 years ago
- Payload Generation Framework☆98Updated last year
- AV Evasion Techniques☆82Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆232Updated 11 months ago
- ☆62Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Updated 3 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- generate payloads that force authentication against an attacker machine☆117Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- Precompiled executable☆61Updated 10 months ago
- Patch AMSI and ETW☆250Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 months ago
- ☆35Updated 4 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- ☆215Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆76Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆186Updated 2 months ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆46Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆277Updated last week
- ☆75Updated 9 months ago