Impersonate Tokens using only NTAPI functions
-
Updated
Apr 4, 2025 - C++
Impersonate Tokens using only NTAPI functions
Token impersonation. Administrator to SYSTEM. No tools required.
Spawn SYSTEM shells like a PRO!
Make or Steal a Token
Demonstrating the real-world uses of crackmapexec, ntlmrelayx, Metasploit's psexec module, and Metasploit's Incognito for Token Impersonation
The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.
Windows Local Privilege Escalation Tool. Exploits COM server hijacking to elevate privileges from local service to SYSTEM.
Proof of concept for different Windows vulnerabilities
Add a description, image, and links to the token-impersonation topic page so that developers can more easily learn about it.
To associate your repository with the token-impersonation topic, visit your repo's landing page and select "manage topics."