SeRestorePrivilege to SYSTEM
☆135Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for SeRestoreAbuse
Users that are interested in SeRestoreAbuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SeManageVolumePrivilege to SYSTEM☆150Nov 22, 2023Updated 2 years ago
- ☆185May 29, 2023Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- ☆259Feb 17, 2023Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆437Jul 29, 2013Updated 12 years ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆278Apr 17, 2023Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆947Nov 12, 2022Updated 3 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆374Apr 19, 2023Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆460Aug 2, 2024Updated last year
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated last month
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆477May 16, 2024Updated last year
- ☆52Oct 10, 2025Updated 5 months ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A tool to help query AD via the LDAP protocol☆614Sep 25, 2024Updated last year
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,097May 29, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,351Jul 12, 2024Updated last year
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆167Sep 13, 2021Updated 4 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆143Mar 9, 2024Updated 2 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,362Sep 22, 2025Updated 6 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆139May 30, 2022Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆622Aug 15, 2025Updated 7 months ago
- Kerberoast with ACL abuse capabilities☆624Dec 16, 2024Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆675May 3, 2020Updated 5 years ago
- ☆63May 31, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆617Jan 2, 2025Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆574Jan 20, 2026Updated 2 months ago
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated last year
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 4 months ago