Impersonate Tokens using only NTAPI functions
-
Updated
Apr 4, 2025 - C++
Impersonate Tokens using only NTAPI functions
Token impersonation. Administrator to SYSTEM. No tools required.
Spawn SYSTEM shells like a PRO!
Make or Steal a Token
Demonstrating the real-world uses of crackmapexec, ntlmrelayx, Metasploit's psexec module, and Metasploit's Incognito for Token Impersonation
Windows Local Privilege Escalation Tool. Exploits COM server hijacking to elevate privileges from local service to SYSTEM.
The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.
Proof of concept for different Windows vulnerabilities
Add a description, image, and links to the token-impersonation topic page so that developers can more easily learn about it.
To associate your repository with the token-impersonation topic, visit your repo's landing page and select "manage topics."