xunyang1 / ssp_dump_lsassLinks
RPC 调用添加ssp扩展dump lsass
☆19Updated 2 years ago
Alternatives and similar repositories for ssp_dump_lsass
Users that are interested in ssp_dump_lsass are comparing it to the libraries listed below
Sorting:
- command execute without 445 port☆52Updated 3 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆77Updated 2 years ago
- ☆15Updated last year
- 利用EFSRPC协议批量探测出网☆66Updated last year
- MSSQL CLR for pentest.☆54Updated last year
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆49Updated 2 years ago
- ☆46Updated 4 years ago
- ☆34Updated 4 months ago
- ☆31Updated last year
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- ☆24Updated 3 months ago
- ☆49Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- ASPX ShellCode Loader☆50Updated last year
- kill windows log☆45Updated last year
- ☆17Updated last year
- AddDefenderExclusions Beacon Object File☆41Updated 2 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆38Updated 10 months ago
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 3 months ago
- More EFS coerced authentication method with PetitPotam.py☆24Updated 2 years ago
- PortBender修改为exe版本☆28Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆131Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆77Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24Updated 4 years ago