Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/py7hagoras/GetSystem
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
https://github.com/py7hagoras/GetSystem
Last synced: 22 days ago
JSON representation
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
- Host: GitHub
- URL: https://github.com/py7hagoras/GetSystem
- Owner: py7hagoras
- Created: 2020-01-08T16:19:34.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2023-02-14T02:20:22.000Z (almost 2 years ago)
- Last Synced: 2024-08-05T17:26:02.838Z (4 months ago)
- Language: C#
- Size: 146 KB
- Stars: 104
- Watchers: 3
- Forks: 26
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - py7hagoras/GetSystem - This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process. (C# #)
README
# GetSystem
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process. Helps avoid the use of PSEXEC which is closely monitored by Blue Team.# Usage:
GetSystem.exe
GetSystem.exe C:\Windows\System32\cmd.exe lsass![Showing run of GetSystem to spawn cmd.exe as SYSTEM with lsass as parent](https://github.com/py7hagoras/GetSystem/raw/master/GetSystem.PNG)