Impersonate Tokens using only NTAPI functions
-
Updated
Apr 4, 2025 - C++
Impersonate Tokens using only NTAPI functions
👻 Systematically Seizing SYSTEM Rights — Alternative to PSExec for SYSTEM privilege escalation through token theft.
Spawn SYSTEM shells like a PRO!
Make or Steal a Token
Demonstrating the real-world uses of crackmapexec, ntlmrelayx, Metasploit's psexec module, and Metasploit's Incognito for Token Impersonation
Proof of concept for different Windows vulnerabilities
Windows Local Privilege Escalation Tool. Exploits COM server hijacking to elevate privileges from local service to SYSTEM.
The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.
Add a description, image, and links to the token-impersonation topic page so that developers can more easily learn about it.
To associate your repository with the token-impersonation topic, visit your repo's landing page and select "manage topics."