| M2TeamArchived/NSudo |
1,721 |
|
0 |
0 |
over 3 years ago |
0 |
|
|
other |
C++ |
| [Deprecated, work in progress alternative: https://github.com/M2Team/NanaRun] Series of System Administration Tools |
| hatRiot/token-priv |
445 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
mit |
C++ |
| Token Privilege Research |
| yusufqk/SystemToken |
156 |
|
0 |
0 |
almost 6 years ago |
0 |
|
1 |
|
C |
| Steal privileged token to obtain SYSTEM shell |
| quentinhardy/pytmipe |
115 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
|
Python |
| Python library and client for token manipulations and impersonations for privilege escalation on Windows |
| cbayet/Exploit-CVE-2017-6008 |
108 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
|
C++ |
| Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation. |
| TarlogicSecurity/sepriv |
12 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
agpl-3.0 |
C |
| Tool to manage user privileges |
| lmammino/sample-jwt-webapp |
9 |
|
0 |
0 |
almost 8 years ago |
0 |
|
0 |
mit |
JavaScript |
| A sample JWT web app that can be use to demonstrate how to escalate permissions by cracking and forging JWT tokens |
| jborean93/PSAccessToken |
8 |
|
0 |
0 |
over 3 years ago |
0 |
|
1 |
mit |
PowerShell |
| PowerShell Module that can query, edit, and create Windows Access Tokens |
| connexta/eve |
5 |
|
0 |
0 |
over 4 years ago |
0 |
|
22 |
|
JavaScript |
| Wallboard team project |