yusufqk / SystemTokenLinks
Steal privileged token to obtain SYSTEM shell
☆249Updated 4 years ago
Alternatives and similar repositories for SystemToken
Users that are interested in SystemToken are comparing it to the libraries listed below
Sorting:
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 5 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 5 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆256Updated 4 years ago
- Privilege Escalation Via RpcSs svc☆179Updated 3 years ago
- bypass uac☆143Updated 6 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆191Updated 4 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- Exchange2010 authorized RCE☆155Updated 4 years ago
- ☆187Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 4 years ago
- My CobaltStrike BOFS☆166Updated 2 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 5 years ago
- A backdoor module for Apache2☆197Updated 5 years ago
- 破解CS4.0☆162Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Programmatically create an administrative user under Windows☆180Updated 8 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 6 months ago
- a pass-the-hash tool☆104Updated 7 years ago
- A Simple Backdoor For Apache HTTP Server☆155Updated 9 months ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆244Updated 5 years ago
- JScript RAT☆101Updated 4 years ago
- Cobalt Strike Python API☆300Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆244Updated 4 years ago