SeRestorePrivilege to SYSTEM
☆133Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for SeRestoreAbuse
Users that are interested in SeRestoreAbuse are comparing it to the libraries listed below
Sorting:
- SeManageVolumePrivilege to SYSTEM☆145Nov 22, 2023Updated 2 years ago
- ☆181May 29, 2023Updated 2 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- ☆254Feb 17, 2023Updated 3 years ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆468May 16, 2024Updated last year
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆429Jul 29, 2013Updated 12 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆776Jan 26, 2026Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆458Aug 2, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆277Apr 17, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆939Nov 12, 2022Updated 3 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆568Jan 20, 2026Updated last month
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆166Sep 13, 2021Updated 4 years ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138May 30, 2022Updated 3 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- ☆829Sep 9, 2022Updated 3 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,090May 29, 2024Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆861Feb 14, 2026Updated 2 weeks ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- Fileless atexec, no more need for port 445☆404Mar 28, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆674May 3, 2020Updated 5 years ago
- Performing Indirect Clean Syscalls☆605Apr 19, 2023Updated 2 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,350Sep 22, 2025Updated 5 months ago