Lists (3)
Sort Name ascending (A-Z)
Stars
Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into…
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
LSASS memory dumper using direct system calls and API unhooking.
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Abusing impersonation privileges through the "Printer Bug"
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the ori…
SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.
Recover the default privilege set of a LOCAL/NETWORK SERVICE account
Windows Privilege Escalation from User to Domain Admin.
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
A repository for learning various heap exploitation techniques.
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
Arsenal is just a quick inventory and launcher for hacking programs
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
ThePorgs / impacket
Forked from fortra/impacketImpacket is a collection of Python classes for working with network protocols.
A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.