Loads a custom dll in system32 via diaghub.
☆82Mar 16, 2020Updated 5 years ago
Alternatives and similar repositories for diaghub
Users that are interested in diaghub are comparing it to the libraries listed below
Sorting:
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆403Jun 6, 2020Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆230Feb 20, 2020Updated 6 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆130Aug 20, 2018Updated 7 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- Joomla login bruteforce☆107Jul 18, 2024Updated last year
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 5 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆81Feb 21, 2019Updated 7 years ago
- ☆164Sep 18, 2025Updated 5 months ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆433Jul 29, 2013Updated 12 years ago
- GitLab User Enumeration☆53Jan 3, 2025Updated last year
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆325Sep 18, 2022Updated 3 years ago
- ☆15Oct 29, 2024Updated last year
- ☆11Aug 7, 2021Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- getsystem via parent process using ps1 & embeded c#☆467Oct 26, 2023Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- Python script to decrypt passwords stored by mRemoteNG☆173Jul 6, 2023Updated 2 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Dec 13, 2020Updated 5 years ago
- ☆189Jan 12, 2026Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,391Jun 27, 2024Updated last year
- Capcom Rootkit POC☆209Mar 5, 2017Updated 9 years ago
- linikatz is a tool to attack AD on UNIX☆595Oct 19, 2023Updated 2 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- POC for NetworkService PrivEsc☆130May 4, 2020Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Sep 9, 2021Updated 4 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆887Apr 8, 2025Updated 11 months ago
- Abusing impersonation privileges through the "Printer Bug"☆2,191Sep 10, 2020Updated 5 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,158Jan 9, 2021Updated 5 years ago