https://github.com/py7hagoras/GetSystem
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
https://github.com/py7hagoras/GetSystem
Last synced: 7 months ago
JSON representation
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
- Host: GitHub
- URL: https://github.com/py7hagoras/GetSystem
- Owner: py7hagoras
- Created: 2020-01-08T16:19:34.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2023-02-14T02:20:22.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:26:02.838Z (11 months ago)
- Language: C#
- Size: 146 KB
- Stars: 104
- Watchers: 3
- Forks: 26
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - py7hagoras/GetSystem - This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process. (C# #)
README
# GetSystem
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process. Helps avoid the use of PSEXEC which is closely monitored by Blue Team.# Usage:
GetSystem.exe
GetSystem.exe C:\Windows\System32\cmd.exe lsass