There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Repository Details
This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate and use whatever token present at any process