Category: Post Exploitation


SharpDPAPI v1.7 releases: C# port of some Mimikatz DPAPI functionality

SharpDPAPI SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi‘s Mimikatz project. The SharpChrome subproject is an adaptation of work from @gentilkiwi and @djhohnstein, specifically his SharpChrome project. However, this version of SharpChrome uses a different version of the C# SQL library that...


UACME v3.2.5 releases: Defeating Windows User Account Control

UACMe Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version too). Admin account with UAC set on default settings...


enumy v1.4 releases: Post-Exploitation Enumeration

Enumy Enumy is a portable executable that you drop on the target Linux machine during a pentest or CTF in the post-exploitation phase. Running enumy will enumerate the box for common security vulnerabilities. It...