├── .github ├── FUNDING.yml ├── banner.drawio └── banner.png ├── README.md ├── methods ├── MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol │ ├── 12. Remote call to NetrDfsAddStdRoot (opnum 12) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── hash.png │ │ │ └── poc.png │ └── 13. Remote call to NetrDfsRemoveStdRoot (opnum 13) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ ├── hash.png │ │ └── poc.png ├── MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol │ ├── 00. Remote call to EfsRpcOpenFileRaw (opnum 0) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 04. Remote call to EfsRpcEncryptFileSrv (opnum 4) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 05. Remote call to EfsRpcDecryptFileSrv (opnum 5) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 06. Remote call to EfsRpcQueryUsersOnFile (opnum 6) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 12. Remote call to EfsRpcFileKeyInfo (opnum 12) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── coercer-fuzz.png │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── hash.png │ │ │ └── poc.png │ ├── 15. Remote call to EfsRpcAddUsersToFileEx (opnum 15) │ │ ├── README.md │ │ └── coerce_poc.py │ └── 16. Remote call to EfsRpcFileKeyInfoEx (opnum 16) │ │ ├── README.md │ │ └── coerce_poc.py ├── MS-FSRVP - File Server Remote VSS Protocol │ ├── 08. Remote call to IsPathSupported (opnum 8) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ │ ├── hash.png │ │ │ └── poc.png │ └── 09. Remote call to IsPathShadowCopied (opnum 9) │ │ ├── README.md │ │ ├── coerce_poc.py │ │ └── imgs │ │ ├── hash.png │ │ └── poc.png ├── MS-PAR - Print System Asynchronous Remote Protocol │ └── 00. Remote call to RpcAsyncOpenPrinter (opnum 0) │ │ ├── README.md │ │ └── coerce_poc.py └── MS-RPRN - Print System Remote Protocol │ ├── 62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62) │ ├── README.md │ ├── coerce_poc.py │ └── imgs │ │ ├── hash.png │ │ └── poc.png │ └── 65. Remote call to RpcRemoteFindFirstPrinterChangeNotificationEx (opnum 65) │ ├── README.md │ └── coerce_poc.py └── possible-working-calls ├── MC-IISA - Internet Information Services (IIS) Application Host COM Protocol ├── 03. Remote call to GetAdminSection (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to GetConfigFile (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to MapPath (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to OnSectionChanges (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to GetUniqueConfigPath (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 05. Remote call to AddLocation (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to GetAdminSection (opnum 6) │ ├── README.md │ └── coerce_poc.py └── 06. Remote call to MapPath (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol ├── 07. Remote call to Init (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to ADsPath (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to PathName (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to PathName (opnum 15) │ ├── README.md │ └── coerce_poc.py └── 34. Remote call to Open (opnum 34) │ ├── README.md │ └── coerce_poc.py ├── MS-BRWSA - Common Internet File System (CIFS) Browser Auxiliary Protocol └── 02. Remote call to I_BrowserrQueryOtherDomains (opnum 2) │ ├── README.md │ └── coerce_poc.py ├── MS-CMRP - Failover Cluster Management API (ClusAPI) Protocol └── 104. Remote call to ApiBackupClusterDatabase (opnum 104) │ ├── README.md │ └── coerce_poc.py ├── MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol ├── 03. Remote call to CreateShare (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to ImportFromFile (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to CreateEmptyDir (opnum 4) │ ├── README.md │ └── coerce_poc.py └── 05. Remote call to RemoveShare (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep) ├── 05. Remote call to CprepCsvTestSetup3 (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to CprepConnectToNewSmbShares3 (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 17. Remote call to CprepDiskWriteFileData (opnum 17) │ ├── README.md │ └── coerce_poc.py ├── 18. Remote call to CprepDiskVerifyFileData (opnum 18) │ ├── README.md │ └── coerce_poc.py └── 19. Remote call to CprepDiskDeleteFile (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol ├── 01. Remote call to NetrDfsAdd (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 02. Remote call to NetrDfsRemove (opnum 2) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to NetrDfsSetInfo (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to NetrDfsGetInfo (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to NetrDfsMove (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 10. Remote call to NetrDfsAddFtRoot (opnum 10) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to NetrDfsRemoveFtRoot (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to NetrDfsAddStdRoot (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to NetrDfsRemoveStdRoot (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to NetrDfsManagerInitialize (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to NetrDfsAddStdRootForced (opnum 15) │ ├── README.md │ └── coerce_poc.py ├── 16. Remote call to NetrDfsGetDcAddress (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── 17. Remote call to NetrDfsSetDcAddress (opnum 17) │ ├── README.md │ └── coerce_poc.py ├── 19. Remote call to NetrDfsAdd2 (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── 20. Remote call to NetrDfsRemove2 (opnum 20) │ ├── README.md │ └── coerce_poc.py ├── 21. Remote call to NetrDfsEnumEx (opnum 21) │ ├── README.md │ └── coerce_poc.py ├── 22. Remote call to NetrDfsSetInfo2 (opnum 22) │ ├── README.md │ └── coerce_poc.py ├── 23. Remote call to NetrDfsAddRootTarget (opnum 23) │ ├── README.md │ └── coerce_poc.py └── 24. Remote call to NetrDfsRemoveRootTarget (opnum 24) │ ├── README.md │ └── coerce_poc.py ├── MS-DFSRH - DFS Replication Helper Protocol ├── 09. Remote call to GetReport (opnum 9) │ ├── README.md │ └── coerce_poc.py └── 10. Remote call to GetCompressedReport (opnum 10) │ ├── README.md │ └── coerce_poc.py ├── MS-DHCPM - Microsoft Dynamic Host Configuration Protocol (DHCP) Server Management Protocol ├── 44. Remote call to R_DhcpBackupDatabase (opnum 44) │ ├── README.md │ └── coerce_poc.py └── 45. Remote call to R_DhcpRestoreDatabase (opnum 45) │ ├── README.md │ └── coerce_poc.py ├── MS-DMRP - Disk Management Remote Protocol ├── 07. Remote call to IVolumeClient CreatePartitionAssignAndFormatEx (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to IVolumeClient3 CreatePartitionAssignAndFormatEx (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 31. Remote call to IVolumeClient3 CreateVolumeAssignAndFormatEx (opnum 31) │ ├── README.md │ └── coerce_poc.py ├── 32. Remote call to IVolumeClient CreateVolumeAssignAndFormatEx (opnum 32) │ ├── README.md │ └── coerce_poc.py ├── 77. Remote call to IVolumeClient3 AddAccessPath (opnum 77) │ ├── README.md │ └── coerce_poc.py ├── 78. Remote call to IVolumeClient3 DeleteAccessPath (opnum 78) │ ├── README.md │ └── coerce_poc.py ├── 80. Remote call to IVolumeClient AddAccessPath (opnum 80) │ ├── README.md │ └── coerce_poc.py └── 81. Remote call to IVolumeClient DeleteAccessPath (opnum 81) │ ├── README.md │ └── coerce_poc.py ├── MS-DNSP - Domain Name Service (DNS) Server Management Protocol ├── 00. Remote call to R_DnssrvOperation (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 01. Remote call to R_DnssrvQuery (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 02. Remote call to R_DnssrvComplexOperation (opnum 2) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to R_DnssrvEnumRecords (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to R_DnssrvUpdateRecord (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 05. Remote call to R_DnssrvOperation2 (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to R_DnssrvQuery2 (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to R_DnssrvComplexOperation2 (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to R_DnssrvEnumRecords2 (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to R_DnssrvUpdateRecord2 (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 10. Remote call to R_DnssrvUpdateRecord3 (opnum 10) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to R_DnssrvEnumRecords3 (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to R_DnssrvOperation3 (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to R_DnssrvQuery3 (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to R_DnssrvComplexOperation3 (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to R_DnssrvOperation4 (opnum 15) │ ├── README.md │ └── coerce_poc.py ├── 16. Remote call to R_DnssrvQuery4 (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── 17. Remote call to R_DnssrvUpdateRecord4 (opnum 17) │ ├── README.md │ └── coerce_poc.py └── 18. Remote call to R_DnssrvEnumRecords4 (opnum 18) │ ├── README.md │ └── coerce_poc.py ├── MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol ├── 00. Remote call to EfsRpcOpenFileRaw (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to EfsRpcEncryptFileSrv (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to EfsRpcQueryUsersOnFile (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to EfsRpcRemoveUsersFromFile (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to EfsRpcAddUsersToFile (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to EfsRpcNotSupported (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to EfsRpcFileKeyInfo (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to EfsRpcAddUsersToFileEx (opnum 15) │ ├── README.md │ └── coerce_poc.py ├── 16. Remote call to EfsRpcFileKeyInfoEx (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── 18. Remote call to EfsRpcGetEncryptedFileMetadata (opnum 18) │ ├── README.md │ └── coerce_poc.py ├── 19. Remote call to EfsRpcSetEncryptedFileMetadata (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── 20. Remote call to EfsRpcFlushEfsCache (opnum 20) │ ├── README.md │ └── coerce_poc.py ├── 21. Remote call to EfsRpcEncryptFileExSrv (opnum 21) │ ├── README.md │ └── coerce_poc.py └── 22. Remote call to EfsRpcQueryProtectors (opnum 22) │ ├── README.md │ └── coerce_poc.py ├── MS-EVEN - EventLog Remoting Protocol ├── 00. Remote call to ElfrClearELFW (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 01. Remote call to ElfrBackupELFW (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to ElfrOpenELW (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to ElfrRegisterEventSourceW (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to ElfrOpenBELW (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to ElfrClearELFA (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to ElfrBackupELFA (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to ElfrOpenELA (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to ElfrRegisterEventSourceA (opnum 15) │ ├── README.md │ └── coerce_poc.py └── 16. Remote call to ElfrOpenBELA (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── MS-FAX - Fax Server and Client Remote Protocol ├── 05. Remote call to FaxObs_SendDocument (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to FaxObs_GetQueueFileName (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 27. Remote call to FAX_SendDocumentEx (opnum 27) │ ├── README.md │ └── coerce_poc.py ├── 68. Remote call to FAX_StartCopyToServer (opnum 68) │ ├── README.md │ └── coerce_poc.py └── 86. Remote call to FAX_CheckValidFaxFolder (opnum 86) │ ├── README.md │ └── coerce_poc.py ├── MS-FSRVP - File Server Remote VSS Protocol ├── 03. Remote call to AddToShadowCopySet (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to IsPathSupported (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to IsPathShadowCopied (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 10. Remote call to GetShareMapping (opnum 10) │ ├── README.md │ └── coerce_poc.py └── 11. Remote call to DeleteShareMapping (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol ├── 03. Remote call to AddKey (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to AppCreate (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to CreateApplication (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to AppDelete (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to DeleteApplication (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to DeleteKey (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 05. Remote call to AppUnLoad (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 05. Remote call to DeleteChildKeys (opnum 5) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to AppGetStatus (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 06. Remote call to EnumKeys (opnum 6) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to AppDeleteRecoverable (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 07. Remote call to CopyKey (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to AppRecover (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 08. Remote call to RenameKey (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to AppCreate2 (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to R_SetData (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 10. Remote call to R_GetData (opnum 10) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to DeleteData (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to R_EnumData (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to R_GetAllData (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to DeleteAllData (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to CopyData (opnum 15) │ ├── README.md │ └── coerce_poc.py ├── 16. Remote call to GetDataPaths (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── 17. Remote call to OpenKey (opnum 17) │ ├── README.md │ └── coerce_poc.py ├── 23. Remote call to GetDataSetNumber (opnum 23) │ ├── README.md │ └── coerce_poc.py ├── 24. Remote call to SetLastChangeTime (opnum 24) │ ├── README.md │ └── coerce_poc.py ├── 25. Remote call to GetLastChangeTime (opnum 25) │ ├── README.md │ └── coerce_poc.py ├── 36. Remote call to Export (opnum 36) │ ├── README.md │ └── coerce_poc.py ├── 37. Remote call to Import (opnum 37) │ ├── README.md │ └── coerce_poc.py └── 40. Remote call to GetChildPaths (opnum 40) │ ├── README.md │ └── coerce_poc.py ├── MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol ├── 02. Remote call to R_QMOpenRemoteQueue (opnum 2) │ ├── README.md │ └── coerce_poc.py └── 19. Remote call to rpc_QMOpenQueueInternal (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol ├── 02. Remote call to R_OpenQueue (opnum 2) │ ├── README.md │ └── coerce_poc.py └── 11. Remote call to R_OpenQueueForMove (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── MS-NRPC - Netlogon Remote Protocol ├── 00. Remote call to NetrLogonUasLogon (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 01. Remote call to NetrLogonUasLogoff (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to NetrGetDCName (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to NetrLogonControl (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to NetrGetAnyDCName (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to NetrLogonControl2 (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 18. Remote call to NetrLogonControl2Ex (opnum 18) │ ├── README.md │ └── coerce_poc.py ├── 19. Remote call to NetrEnumerateTrustedDomains (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── 21. Remote call to NetrLogonGetCapabilities (opnum 21) │ ├── README.md │ └── coerce_poc.py ├── 22. Remote call to NetrLogonSetServiceBits (opnum 22) │ ├── README.md │ └── coerce_poc.py ├── 23. Remote call to NetrLogonGetTrustRid (opnum 23) │ ├── README.md │ └── coerce_poc.py ├── 24. Remote call to NetrLogonComputeServerDigest (opnum 24) │ ├── README.md │ └── coerce_poc.py ├── 25. Remote call to NetrLogonComputeClientDigest (opnum 25) │ ├── README.md │ └── coerce_poc.py ├── 29. Remote call to NetrLogonGetDomainInfo (opnum 29) │ ├── README.md │ └── coerce_poc.py ├── 35. Remote call to NetrLogonGetTimeServiceParentDomain (opnum 35) │ ├── README.md │ └── coerce_poc.py ├── 36. Remote call to NetrEnumerateTrustedDomainsEx (opnum 36) │ ├── README.md │ └── coerce_poc.py ├── 38. Remote call to DsrGetDcSiteCoverageW (opnum 38) │ ├── README.md │ └── coerce_poc.py ├── 40. Remote call to DsrEnumerateDomainTrusts (opnum 40) │ ├── README.md │ └── coerce_poc.py ├── 41. Remote call to DsrDeregisterDnsHostRecords (opnum 41) │ ├── README.md │ └── coerce_poc.py ├── 43. Remote call to DsrGetForestTrustInformation (opnum 43) │ ├── README.md │ └── coerce_poc.py ├── 44. Remote call to NetrGetForestTrustInformation (opnum 44) │ ├── README.md │ └── coerce_poc.py ├── 48. Remote call to DsrUpdateReadOnlyServerDnsRecords (opnum 48) │ ├── README.md │ └── coerce_poc.py └── 49. Remote call to NetrChainSetClientAttributes (opnum 49) │ ├── README.md │ └── coerce_poc.py ├── MS-PAR - Print System Asynchronous Remote Protocol ├── 00. Remote call to RpcAsyncOpenPrinter (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 44. Remote call to RpcAsyncAddPrintProcessor (opnum 44) │ ├── README.md │ └── coerce_poc.py └── 63. Remote call to RpcAsyncUploadPrinterDriverPackage (opnum 63) │ ├── README.md │ └── coerce_poc.py ├── MS-PLA - Performance Logs and Alerts Protocol └── 31. Remote call to Extract (opnum 31) │ ├── README.md │ └── coerce_poc.py ├── MS-RAIW - Remote Administrative Interface WINS ├── 03. Remote call to R_WinsDoStaticInit (opnum 3) │ ├── README.md │ └── coerce_poc.py └── 07. Remote call to R_WinsBackup (opnum 7) │ ├── README.md │ └── coerce_poc.py ├── MS-RPRN - Print System Remote Protocol ├── 01. Remote call to RpcOpenPrinter (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to RpcAddPrintProcessor (opnum 14) │ ├── README.md │ └── coerce_poc.py └── 69. Remote call to RpcOpenPrinterEx (opnum 69) │ ├── README.md │ └── coerce_poc.py ├── MS-RRASM - Routing and Remote Access Server (RRAS) Management Protocol └── 37. Remote call to RRouterInterfaceTransportCreate (opnum 37) │ ├── README.md │ └── coerce_poc.py ├── MS-RRP - Windows Remote Registry Protocol ├── 00. Remote call to OpenClassesRoot (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 01. Remote call to OpenCurrentUser (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 02. Remote call to OpenLocalMachine (opnum 2) │ ├── README.md │ └── coerce_poc.py ├── 03. Remote call to OpenPerformanceData (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── 04. Remote call to OpenUsers (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 27. Remote call to OpenCurrentConfig (opnum 27) │ ├── README.md │ └── coerce_poc.py ├── 32. Remote call to OpenPerformanceText (opnum 32) │ ├── README.md │ └── coerce_poc.py └── 33. Remote call to OpenPerformanceNlsText (opnum 33) │ ├── README.md │ └── coerce_poc.py ├── MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server) ├── 00. Remote call to SamrConnect (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 55. Remote call to SamrUnicodeChangePasswordUser2 (opnum 55) │ ├── README.md │ └── coerce_poc.py ├── 57. Remote call to SamrConnect2 (opnum 57) │ ├── README.md │ └── coerce_poc.py ├── 62. Remote call to SamrConnect4 (opnum 62) │ ├── README.md │ └── coerce_poc.py ├── 64. Remote call to SamrConnect5 (opnum 64) │ ├── README.md │ └── coerce_poc.py └── 73. Remote call to SamrUnicodeChangePasswordUser4 (opnum 73) │ ├── README.md │ └── coerce_poc.py ├── MS-SRVS - Server Service Remote Protocol ├── 08. Remote call to NetrConnectionEnum (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── 09. Remote call to NetrFileEnum (opnum 9) │ ├── README.md │ └── coerce_poc.py ├── 10. Remote call to NetrFileGetInfo (opnum 10) │ ├── README.md │ └── coerce_poc.py ├── 11. Remote call to NetrFileClose (opnum 11) │ ├── README.md │ └── coerce_poc.py ├── 12. Remote call to NetrSessionEnum (opnum 12) │ ├── README.md │ └── coerce_poc.py ├── 13. Remote call to NetrSessionDel (opnum 13) │ ├── README.md │ └── coerce_poc.py ├── 14. Remote call to NetrShareAdd (opnum 14) │ ├── README.md │ └── coerce_poc.py ├── 15. Remote call to NetrShareEnum (opnum 15) │ ├── README.md │ └── coerce_poc.py ├── 16. Remote call to NetrShareGetInfo (opnum 16) │ ├── README.md │ └── coerce_poc.py ├── 17. Remote call to NetrShareSetInfo (opnum 17) │ ├── README.md │ └── coerce_poc.py ├── 18. Remote call to NetrShareDel (opnum 18) │ ├── README.md │ └── coerce_poc.py ├── 19. Remote call to NetrShareDelSticky (opnum 19) │ ├── README.md │ └── coerce_poc.py ├── 20. Remote call to NetrShareCheck (opnum 20) │ ├── README.md │ └── coerce_poc.py ├── 21. Remote call to NetrServerGetInfo (opnum 21) │ ├── README.md │ └── coerce_poc.py ├── 22. Remote call to NetrServerSetInfo (opnum 22) │ ├── README.md │ └── coerce_poc.py ├── 23. Remote call to NetrServerDiskEnum (opnum 23) │ ├── README.md │ └── coerce_poc.py ├── 24. Remote call to NetrServerStatisticsGet (opnum 24) │ ├── README.md │ └── coerce_poc.py ├── 25. Remote call to NetrServerTransportAdd (opnum 25) │ ├── README.md │ └── coerce_poc.py ├── 26. Remote call to NetrServerTransportEnum (opnum 26) │ ├── README.md │ └── coerce_poc.py ├── 27. Remote call to NetrServerTransportDel (opnum 27) │ ├── README.md │ └── coerce_poc.py ├── 28. Remote call to NetrRemoteTOD (opnum 28) │ ├── README.md │ └── coerce_poc.py ├── 30. Remote call to NetprPathType (opnum 30) │ ├── README.md │ └── coerce_poc.py ├── 31. Remote call to NetprPathCanonicalize (opnum 31) │ ├── README.md │ └── coerce_poc.py ├── 32. Remote call to NetprPathCompare (opnum 32) │ ├── README.md │ └── coerce_poc.py ├── 33. Remote call to NetprNameValidate (opnum 33) │ ├── README.md │ └── coerce_poc.py ├── 34. Remote call to NetprNameCanonicalize (opnum 34) │ ├── README.md │ └── coerce_poc.py ├── 35. Remote call to NetprNameCompare (opnum 35) │ ├── README.md │ └── coerce_poc.py ├── 36. Remote call to NetrShareEnumSticky (opnum 36) │ ├── README.md │ └── coerce_poc.py ├── 37. Remote call to NetrShareDelStart (opnum 37) │ ├── README.md │ └── coerce_poc.py ├── 39. Remote call to NetrpGetFileSecurity (opnum 39) │ ├── README.md │ └── coerce_poc.py ├── 40. Remote call to NetrpSetFileSecurity (opnum 40) │ ├── README.md │ └── coerce_poc.py ├── 41. Remote call to NetrServerTransportAddEx (opnum 41) │ ├── README.md │ └── coerce_poc.py ├── 43. Remote call to NetrDfsGetVersion (opnum 43) │ ├── README.md │ └── coerce_poc.py ├── 44. Remote call to NetrDfsCreateLocalPartition (opnum 44) │ ├── README.md │ └── coerce_poc.py ├── 45. Remote call to NetrDfsDeleteLocalPartition (opnum 45) │ ├── README.md │ └── coerce_poc.py ├── 46. Remote call to NetrDfsSetLocalVolumeState (opnum 46) │ ├── README.md │ └── coerce_poc.py ├── 48. Remote call to NetrDfsCreateExitPoint (opnum 48) │ ├── README.md │ └── coerce_poc.py ├── 49. Remote call to NetrDfsDeleteExitPoint (opnum 49) │ ├── README.md │ └── coerce_poc.py ├── 50. Remote call to NetrDfsModifyPrefix (opnum 50) │ ├── README.md │ └── coerce_poc.py ├── 51. Remote call to NetrDfsFixLocalVolume (opnum 51) │ ├── README.md │ └── coerce_poc.py ├── 52. Remote call to NetrDfsManagerReportSiteInfo (opnum 52) │ ├── README.md │ └── coerce_poc.py ├── 53. Remote call to NetrServerTransportDelEx (opnum 53) │ ├── README.md │ └── coerce_poc.py ├── 55. Remote call to NetrServerAliasEnum (opnum 55) │ ├── README.md │ └── coerce_poc.py ├── 56. Remote call to NetrServerAliasDel (opnum 56) │ ├── README.md │ └── coerce_poc.py └── 57. Remote call to NetrShareDelEx (opnum 57) │ ├── README.md │ └── coerce_poc.py ├── MS-SWN - Service Witness Protocol └── 04. Remote call to WitnessrRegisterEx (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── MS-TSCH - Task Scheduler Service Remoting Protocol ├── 00. Remote call to NetrJobAdd (opnum 0) │ ├── README.md │ └── coerce_poc.py ├── 01. Remote call to NetrJobDel (opnum 1) │ ├── README.md │ └── coerce_poc.py ├── 02. Remote call to NetrJobEnum (opnum 2) │ ├── README.md │ └── coerce_poc.py └── 03. Remote call to NetrJobGetInfo (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── MS-UAMG - Update Agent Management Protocol └── 18. Remote call to IUpdateServiceManager2 AddService2 (opnum 18) │ ├── README.md │ └── coerce_poc.py ├── MS-VDS - Virtual Disk Service (VDS) Protocol ├── 04. Remote call to IVdsVdProvider CreateVDisk (opnum 4) │ ├── README.md │ └── coerce_poc.py ├── 05. Remote call to IVdsVdProvider AddVDisk (opnum 5) │ ├── README.md │ └── coerce_poc.py └── 08. Remote call to IVdsServiceIscsi SetInitiatorSharedSecret (opnum 8) │ ├── README.md │ └── coerce_poc.py ├── MS-WMI - Windows Management Instrumentation Remote Protocol └── 03. Remote call to IWbemRefreshingServices AddObjectToRefresher (opnum 3) │ ├── README.md │ └── coerce_poc.py ├── MS-WSRM - Windows System Resource Manager (WSRM) Protocol └── 07. Remote call to CreateAccountingDb (opnum 7) │ ├── README.md │ └── coerce_poc.py └── README.md /.github/FUNDING.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/.github/FUNDING.yml -------------------------------------------------------------------------------- /.github/banner.drawio: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/.github/banner.drawio -------------------------------------------------------------------------------- /.github/banner.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/.github/banner.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/README.md -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/README.md -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/README.md -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/05. Remote call to EfsRpcDecryptFileSrv (opnum 5)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/coercer-fuzz.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/coercer-fuzz.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/13. Remote call to EfsRpcDuplicateEncryptionInfoFile (opnum 13)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/README.md -------------------------------------------------------------------------------- /methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/README.md -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/README.md -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/README.md -------------------------------------------------------------------------------- /methods/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/README.md -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/coerce_poc.py -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/imgs/hash.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/imgs/hash.png -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/imgs/poc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/62. Remote call to RpcRemoteFindFirstPrinterChangeNotification (opnum 62)/imgs/poc.png -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/65. Remote call to RpcRemoteFindFirstPrinterChangeNotificationEx (opnum 65)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/65. Remote call to RpcRemoteFindFirstPrinterChangeNotificationEx (opnum 65)/README.md -------------------------------------------------------------------------------- /methods/MS-RPRN - Print System Remote Protocol/65. Remote call to RpcRemoteFindFirstPrinterChangeNotificationEx (opnum 65)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/methods/MS-RPRN - Print System Remote Protocol/65. Remote call to RpcRemoteFindFirstPrinterChangeNotificationEx (opnum 65)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to GetAdminSection (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to GetAdminSection (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to GetConfigFile (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to GetConfigFile (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to MapPath (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to MapPath (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to MapPath (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to MapPath (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to OnSectionChanges (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/03. Remote call to OnSectionChanges (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/05. Remote call to AddLocation (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/05. Remote call to AddLocation (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/05. Remote call to AddLocation (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/05. Remote call to AddLocation (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to GetAdminSection (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to GetAdminSection (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to MapPath (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to MapPath (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to MapPath (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-IISA - Internet Information Services (IIS) Application Host COM Protocol/06. Remote call to MapPath (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/07. Remote call to Init (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/07. Remote call to Init (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/07. Remote call to Init (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/07. Remote call to Init (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to ADsPath (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to ADsPath (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to ADsPath (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to ADsPath (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to PathName (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to PathName (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to PathName (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/13. Remote call to PathName (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/15. Remote call to PathName (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/15. Remote call to PathName (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/15. Remote call to PathName (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/15. Remote call to PathName (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/34. Remote call to Open (opnum 34)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/34. Remote call to Open (opnum 34)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/34. Remote call to Open (opnum 34)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MC-MQAC - Message Queuing (MSMQ) ActiveX Client Protocol/34. Remote call to Open (opnum 34)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-CMRP - Failover Cluster Management API (ClusAPI) Protocol/104. Remote call to ApiBackupClusterDatabase (opnum 104)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CMRP - Failover Cluster Management API (ClusAPI) Protocol/104. Remote call to ApiBackupClusterDatabase (opnum 104)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-CMRP - Failover Cluster Management API (ClusAPI) Protocol/104. Remote call to ApiBackupClusterDatabase (opnum 104)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CMRP - Failover Cluster Management API (ClusAPI) Protocol/104. Remote call to ApiBackupClusterDatabase (opnum 104)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to CreateShare (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to CreateShare (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to CreateShare (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to CreateShare (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to ImportFromFile (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/03. Remote call to ImportFromFile (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/04. Remote call to CreateEmptyDir (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/04. Remote call to CreateEmptyDir (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/05. Remote call to RemoveShare (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/05. Remote call to RemoveShare (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/05. Remote call to RemoveShare (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-COMA - Component Object Model Plus (COM+) Remote Administration Protocol/05. Remote call to RemoveShare (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/05. Remote call to CprepCsvTestSetup3 (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/05. Remote call to CprepCsvTestSetup3 (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/05. Remote call to CprepCsvTestSetup3 (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/05. Remote call to CprepCsvTestSetup3 (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/17. Remote call to CprepDiskWriteFileData (opnum 17)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/17. Remote call to CprepDiskWriteFileData (opnum 17)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/18. Remote call to CprepDiskVerifyFileData (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/18. Remote call to CprepDiskVerifyFileData (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/19. Remote call to CprepDiskDeleteFile (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/19. Remote call to CprepDiskDeleteFile (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/19. Remote call to CprepDiskDeleteFile (opnum 19)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-CSVP - Failover Cluster Setup and Validation Protocol (ClusPrep)/19. Remote call to CprepDiskDeleteFile (opnum 19)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/01. Remote call to NetrDfsAdd (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/01. Remote call to NetrDfsAdd (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/01. Remote call to NetrDfsAdd (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/01. Remote call to NetrDfsAdd (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/02. Remote call to NetrDfsRemove (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/02. Remote call to NetrDfsRemove (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/02. Remote call to NetrDfsRemove (opnum 2)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/02. Remote call to NetrDfsRemove (opnum 2)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/03. Remote call to NetrDfsSetInfo (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/03. Remote call to NetrDfsSetInfo (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/03. Remote call to NetrDfsSetInfo (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/03. Remote call to NetrDfsSetInfo (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/04. Remote call to NetrDfsGetInfo (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/04. Remote call to NetrDfsGetInfo (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/04. Remote call to NetrDfsGetInfo (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/04. Remote call to NetrDfsGetInfo (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/06. Remote call to NetrDfsMove (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/06. Remote call to NetrDfsMove (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/06. Remote call to NetrDfsMove (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/06. Remote call to NetrDfsMove (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/10. Remote call to NetrDfsAddFtRoot (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/10. Remote call to NetrDfsAddFtRoot (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/10. Remote call to NetrDfsAddFtRoot (opnum 10)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/10. Remote call to NetrDfsAddFtRoot (opnum 10)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/11. Remote call to NetrDfsRemoveFtRoot (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/11. Remote call to NetrDfsRemoveFtRoot (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/12. Remote call to NetrDfsAddStdRoot (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/13. Remote call to NetrDfsRemoveStdRoot (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/16. Remote call to NetrDfsGetDcAddress (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/16. Remote call to NetrDfsGetDcAddress (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/17. Remote call to NetrDfsSetDcAddress (opnum 17)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/17. Remote call to NetrDfsSetDcAddress (opnum 17)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/19. Remote call to NetrDfsAdd2 (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/19. Remote call to NetrDfsAdd2 (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/19. Remote call to NetrDfsAdd2 (opnum 19)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/19. Remote call to NetrDfsAdd2 (opnum 19)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/20. Remote call to NetrDfsRemove2 (opnum 20)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/20. Remote call to NetrDfsRemove2 (opnum 20)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/20. Remote call to NetrDfsRemove2 (opnum 20)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/20. Remote call to NetrDfsRemove2 (opnum 20)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/21. Remote call to NetrDfsEnumEx (opnum 21)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/21. Remote call to NetrDfsEnumEx (opnum 21)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/21. Remote call to NetrDfsEnumEx (opnum 21)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/21. Remote call to NetrDfsEnumEx (opnum 21)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/22. Remote call to NetrDfsSetInfo2 (opnum 22)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/22. Remote call to NetrDfsSetInfo2 (opnum 22)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/22. Remote call to NetrDfsSetInfo2 (opnum 22)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/22. Remote call to NetrDfsSetInfo2 (opnum 22)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/23. Remote call to NetrDfsAddRootTarget (opnum 23)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSNM - Distributed File System (DFS) Namespace Management Protocol/23. Remote call to NetrDfsAddRootTarget (opnum 23)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/09. Remote call to GetReport (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/09. Remote call to GetReport (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/09. Remote call to GetReport (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/09. Remote call to GetReport (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/10. Remote call to GetCompressedReport (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/10. Remote call to GetCompressedReport (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/10. Remote call to GetCompressedReport (opnum 10)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DFSRH - DFS Replication Helper Protocol/10. Remote call to GetCompressedReport (opnum 10)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/07. Remote call to IVolumeClient CreatePartitionAssignAndFormatEx (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/07. Remote call to IVolumeClient CreatePartitionAssignAndFormatEx (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/31. Remote call to IVolumeClient3 CreateVolumeAssignAndFormatEx (opnum 31)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/31. Remote call to IVolumeClient3 CreateVolumeAssignAndFormatEx (opnum 31)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/32. Remote call to IVolumeClient CreateVolumeAssignAndFormatEx (opnum 32)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/32. Remote call to IVolumeClient CreateVolumeAssignAndFormatEx (opnum 32)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/77. Remote call to IVolumeClient3 AddAccessPath (opnum 77)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/77. Remote call to IVolumeClient3 AddAccessPath (opnum 77)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/77. Remote call to IVolumeClient3 AddAccessPath (opnum 77)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/77. Remote call to IVolumeClient3 AddAccessPath (opnum 77)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/78. Remote call to IVolumeClient3 DeleteAccessPath (opnum 78)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/78. Remote call to IVolumeClient3 DeleteAccessPath (opnum 78)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/78. Remote call to IVolumeClient3 DeleteAccessPath (opnum 78)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/78. Remote call to IVolumeClient3 DeleteAccessPath (opnum 78)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/80. Remote call to IVolumeClient AddAccessPath (opnum 80)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/80. Remote call to IVolumeClient AddAccessPath (opnum 80)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/80. Remote call to IVolumeClient AddAccessPath (opnum 80)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/80. Remote call to IVolumeClient AddAccessPath (opnum 80)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/81. Remote call to IVolumeClient DeleteAccessPath (opnum 81)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/81. Remote call to IVolumeClient DeleteAccessPath (opnum 81)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DMRP - Disk Management Remote Protocol/81. Remote call to IVolumeClient DeleteAccessPath (opnum 81)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DMRP - Disk Management Remote Protocol/81. Remote call to IVolumeClient DeleteAccessPath (opnum 81)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/00. Remote call to R_DnssrvOperation (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/00. Remote call to R_DnssrvOperation (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/00. Remote call to R_DnssrvOperation (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/00. Remote call to R_DnssrvOperation (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/01. Remote call to R_DnssrvQuery (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/01. Remote call to R_DnssrvQuery (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/01. Remote call to R_DnssrvQuery (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/01. Remote call to R_DnssrvQuery (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/02. Remote call to R_DnssrvComplexOperation (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/02. Remote call to R_DnssrvComplexOperation (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/03. Remote call to R_DnssrvEnumRecords (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/03. Remote call to R_DnssrvEnumRecords (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/03. Remote call to R_DnssrvEnumRecords (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/03. Remote call to R_DnssrvEnumRecords (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/04. Remote call to R_DnssrvUpdateRecord (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/04. Remote call to R_DnssrvUpdateRecord (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/04. Remote call to R_DnssrvUpdateRecord (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/04. Remote call to R_DnssrvUpdateRecord (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/05. Remote call to R_DnssrvOperation2 (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/05. Remote call to R_DnssrvOperation2 (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/05. Remote call to R_DnssrvOperation2 (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/05. Remote call to R_DnssrvOperation2 (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/06. Remote call to R_DnssrvQuery2 (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/06. Remote call to R_DnssrvQuery2 (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/06. Remote call to R_DnssrvQuery2 (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/06. Remote call to R_DnssrvQuery2 (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/07. Remote call to R_DnssrvComplexOperation2 (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/07. Remote call to R_DnssrvComplexOperation2 (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/08. Remote call to R_DnssrvEnumRecords2 (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/08. Remote call to R_DnssrvEnumRecords2 (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/08. Remote call to R_DnssrvEnumRecords2 (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/08. Remote call to R_DnssrvEnumRecords2 (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/09. Remote call to R_DnssrvUpdateRecord2 (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/09. Remote call to R_DnssrvUpdateRecord2 (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/09. Remote call to R_DnssrvUpdateRecord2 (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/09. Remote call to R_DnssrvUpdateRecord2 (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/10. Remote call to R_DnssrvUpdateRecord3 (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/10. Remote call to R_DnssrvUpdateRecord3 (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/10. Remote call to R_DnssrvUpdateRecord3 (opnum 10)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/10. Remote call to R_DnssrvUpdateRecord3 (opnum 10)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/11. Remote call to R_DnssrvEnumRecords3 (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/11. Remote call to R_DnssrvEnumRecords3 (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/11. Remote call to R_DnssrvEnumRecords3 (opnum 11)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/11. Remote call to R_DnssrvEnumRecords3 (opnum 11)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/12. Remote call to R_DnssrvOperation3 (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/12. Remote call to R_DnssrvOperation3 (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/12. Remote call to R_DnssrvOperation3 (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/12. Remote call to R_DnssrvOperation3 (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/13. Remote call to R_DnssrvQuery3 (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/13. Remote call to R_DnssrvQuery3 (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/13. Remote call to R_DnssrvQuery3 (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/13. Remote call to R_DnssrvQuery3 (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/14. Remote call to R_DnssrvComplexOperation3 (opnum 14)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/14. Remote call to R_DnssrvComplexOperation3 (opnum 14)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/15. Remote call to R_DnssrvOperation4 (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/15. Remote call to R_DnssrvOperation4 (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/15. Remote call to R_DnssrvOperation4 (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/15. Remote call to R_DnssrvOperation4 (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/16. Remote call to R_DnssrvQuery4 (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/16. Remote call to R_DnssrvQuery4 (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/16. Remote call to R_DnssrvQuery4 (opnum 16)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/16. Remote call to R_DnssrvQuery4 (opnum 16)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/17. Remote call to R_DnssrvUpdateRecord4 (opnum 17)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/17. Remote call to R_DnssrvUpdateRecord4 (opnum 17)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/17. Remote call to R_DnssrvUpdateRecord4 (opnum 17)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/17. Remote call to R_DnssrvUpdateRecord4 (opnum 17)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/18. Remote call to R_DnssrvEnumRecords4 (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/18. Remote call to R_DnssrvEnumRecords4 (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/18. Remote call to R_DnssrvEnumRecords4 (opnum 18)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-DNSP - Domain Name Service (DNS) Server Management Protocol/18. Remote call to R_DnssrvEnumRecords4 (opnum 18)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/00. Remote call to EfsRpcOpenFileRaw (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/04. Remote call to EfsRpcEncryptFileSrv (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/06. Remote call to EfsRpcQueryUsersOnFile (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/07. Remote call to EfsRpcQueryRecoveryAgents (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/08. Remote call to EfsRpcRemoveUsersFromFile (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/08. Remote call to EfsRpcRemoveUsersFromFile (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/08. Remote call to EfsRpcRemoveUsersFromFile (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/08. Remote call to EfsRpcRemoveUsersFromFile (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/09. Remote call to EfsRpcAddUsersToFile (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/09. Remote call to EfsRpcAddUsersToFile (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/09. Remote call to EfsRpcAddUsersToFile (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/09. Remote call to EfsRpcAddUsersToFile (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/11. Remote call to EfsRpcNotSupported (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/11. Remote call to EfsRpcNotSupported (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/11. Remote call to EfsRpcNotSupported (opnum 11)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/11. Remote call to EfsRpcNotSupported (opnum 11)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/12. Remote call to EfsRpcFileKeyInfo (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/15. Remote call to EfsRpcAddUsersToFileEx (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/16. Remote call to EfsRpcFileKeyInfoEx (opnum 16)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/18. Remote call to EfsRpcGetEncryptedFileMetadata (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/18. Remote call to EfsRpcGetEncryptedFileMetadata (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/19. Remote call to EfsRpcSetEncryptedFileMetadata (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/19. Remote call to EfsRpcSetEncryptedFileMetadata (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/20. Remote call to EfsRpcFlushEfsCache (opnum 20)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/20. Remote call to EfsRpcFlushEfsCache (opnum 20)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/20. Remote call to EfsRpcFlushEfsCache (opnum 20)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/20. Remote call to EfsRpcFlushEfsCache (opnum 20)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/21. Remote call to EfsRpcEncryptFileExSrv (opnum 21)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/21. Remote call to EfsRpcEncryptFileExSrv (opnum 21)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/21. Remote call to EfsRpcEncryptFileExSrv (opnum 21)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/21. Remote call to EfsRpcEncryptFileExSrv (opnum 21)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/22. Remote call to EfsRpcQueryProtectors (opnum 22)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/22. Remote call to EfsRpcQueryProtectors (opnum 22)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/22. Remote call to EfsRpcQueryProtectors (opnum 22)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EFSR - Encrypting File System Remote (EFSRPC) Protocol/22. Remote call to EfsRpcQueryProtectors (opnum 22)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/00. Remote call to ElfrClearELFW (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/00. Remote call to ElfrClearELFW (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/00. Remote call to ElfrClearELFW (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/00. Remote call to ElfrClearELFW (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/01. Remote call to ElfrBackupELFW (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/01. Remote call to ElfrBackupELFW (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/01. Remote call to ElfrBackupELFW (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/01. Remote call to ElfrBackupELFW (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/07. Remote call to ElfrOpenELW (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/07. Remote call to ElfrOpenELW (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/07. Remote call to ElfrOpenELW (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/07. Remote call to ElfrOpenELW (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/08. Remote call to ElfrRegisterEventSourceW (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/08. Remote call to ElfrRegisterEventSourceW (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/08. Remote call to ElfrRegisterEventSourceW (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/08. Remote call to ElfrRegisterEventSourceW (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/09. Remote call to ElfrOpenBELW (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/09. Remote call to ElfrOpenBELW (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/09. Remote call to ElfrOpenBELW (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/09. Remote call to ElfrOpenBELW (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/12. Remote call to ElfrClearELFA (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/12. Remote call to ElfrClearELFA (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/12. Remote call to ElfrClearELFA (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/12. Remote call to ElfrClearELFA (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/13. Remote call to ElfrBackupELFA (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/13. Remote call to ElfrBackupELFA (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/13. Remote call to ElfrBackupELFA (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/13. Remote call to ElfrBackupELFA (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/14. Remote call to ElfrOpenELA (opnum 14)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/14. Remote call to ElfrOpenELA (opnum 14)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/14. Remote call to ElfrOpenELA (opnum 14)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/14. Remote call to ElfrOpenELA (opnum 14)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/15. Remote call to ElfrRegisterEventSourceA (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/15. Remote call to ElfrRegisterEventSourceA (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/15. Remote call to ElfrRegisterEventSourceA (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/15. Remote call to ElfrRegisterEventSourceA (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/16. Remote call to ElfrOpenBELA (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/16. Remote call to ElfrOpenBELA (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-EVEN - EventLog Remoting Protocol/16. Remote call to ElfrOpenBELA (opnum 16)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-EVEN - EventLog Remoting Protocol/16. Remote call to ElfrOpenBELA (opnum 16)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/05. Remote call to FaxObs_SendDocument (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/05. Remote call to FaxObs_SendDocument (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/05. Remote call to FaxObs_SendDocument (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/05. Remote call to FaxObs_SendDocument (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/06. Remote call to FaxObs_GetQueueFileName (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/06. Remote call to FaxObs_GetQueueFileName (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/06. Remote call to FaxObs_GetQueueFileName (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/06. Remote call to FaxObs_GetQueueFileName (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/27. Remote call to FAX_SendDocumentEx (opnum 27)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/27. Remote call to FAX_SendDocumentEx (opnum 27)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/27. Remote call to FAX_SendDocumentEx (opnum 27)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/27. Remote call to FAX_SendDocumentEx (opnum 27)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/68. Remote call to FAX_StartCopyToServer (opnum 68)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/68. Remote call to FAX_StartCopyToServer (opnum 68)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/68. Remote call to FAX_StartCopyToServer (opnum 68)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/68. Remote call to FAX_StartCopyToServer (opnum 68)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/86. Remote call to FAX_CheckValidFaxFolder (opnum 86)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/86. Remote call to FAX_CheckValidFaxFolder (opnum 86)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/86. Remote call to FAX_CheckValidFaxFolder (opnum 86)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FAX - Fax Server and Client Remote Protocol/86. Remote call to FAX_CheckValidFaxFolder (opnum 86)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/03. Remote call to AddToShadowCopySet (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/03. Remote call to AddToShadowCopySet (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/03. Remote call to AddToShadowCopySet (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/03. Remote call to AddToShadowCopySet (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/08. Remote call to IsPathSupported (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/09. Remote call to IsPathShadowCopied (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/10. Remote call to GetShareMapping (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/10. Remote call to GetShareMapping (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/10. Remote call to GetShareMapping (opnum 10)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/10. Remote call to GetShareMapping (opnum 10)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/11. Remote call to DeleteShareMapping (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/11. Remote call to DeleteShareMapping (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/11. Remote call to DeleteShareMapping (opnum 11)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-FSRVP - File Server Remote VSS Protocol/11. Remote call to DeleteShareMapping (opnum 11)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AddKey (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AddKey (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AddKey (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AddKey (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AppCreate (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AppCreate (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AppCreate (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/03. Remote call to AppCreate (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to AppDelete (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to AppDelete (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to AppDelete (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to AppDelete (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to DeleteKey (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to DeleteKey (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to DeleteKey (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/04. Remote call to DeleteKey (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/05. Remote call to AppUnLoad (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/05. Remote call to AppUnLoad (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/05. Remote call to AppUnLoad (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/05. Remote call to AppUnLoad (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to AppGetStatus (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to AppGetStatus (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to EnumKeys (opnum 6)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to EnumKeys (opnum 6)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to EnumKeys (opnum 6)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/06. Remote call to EnumKeys (opnum 6)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/07. Remote call to CopyKey (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/07. Remote call to CopyKey (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/07. Remote call to CopyKey (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/07. Remote call to CopyKey (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to AppRecover (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to AppRecover (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to RenameKey (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to RenameKey (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to RenameKey (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/08. Remote call to RenameKey (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to AppCreate2 (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to AppCreate2 (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to R_SetData (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to R_SetData (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to R_SetData (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/09. Remote call to R_SetData (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/10. Remote call to R_GetData (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/10. Remote call to R_GetData (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/11. Remote call to DeleteData (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/11. Remote call to DeleteData (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/12. Remote call to R_EnumData (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/12. Remote call to R_EnumData (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/13. Remote call to R_GetAllData (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/13. Remote call to R_GetAllData (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/15. Remote call to CopyData (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/15. Remote call to CopyData (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/15. Remote call to CopyData (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/15. Remote call to CopyData (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/16. Remote call to GetDataPaths (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/16. Remote call to GetDataPaths (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/17. Remote call to OpenKey (opnum 17)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/17. Remote call to OpenKey (opnum 17)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/17. Remote call to OpenKey (opnum 17)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/17. Remote call to OpenKey (opnum 17)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/36. Remote call to Export (opnum 36)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/36. Remote call to Export (opnum 36)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/36. Remote call to Export (opnum 36)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/36. Remote call to Export (opnum 36)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/37. Remote call to Import (opnum 37)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/37. Remote call to Import (opnum 37)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/37. Remote call to Import (opnum 37)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-IMSA - Internet Information Services (IIS) IMSAdminBaseW Remote Protocol/37. Remote call to Import (opnum 37)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/02. Remote call to R_QMOpenRemoteQueue (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/02. Remote call to R_QMOpenRemoteQueue (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/02. Remote call to R_QMOpenRemoteQueue (opnum 2)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/02. Remote call to R_QMOpenRemoteQueue (opnum 2)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/19. Remote call to rpc_QMOpenQueueInternal (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQMP - Message Queuing (MSMQ) Queue Manager Client Protocol/19. Remote call to rpc_QMOpenQueueInternal (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/02. Remote call to R_OpenQueue (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/02. Remote call to R_OpenQueue (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/02. Remote call to R_OpenQueue (opnum 2)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/02. Remote call to R_OpenQueue (opnum 2)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/11. Remote call to R_OpenQueueForMove (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-MQRR - Message Queuing (MSMQ) Queue Manager Remote Read Protocol/11. Remote call to R_OpenQueueForMove (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/00. Remote call to NetrLogonUasLogon (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/00. Remote call to NetrLogonUasLogon (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/00. Remote call to NetrLogonUasLogon (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/00. Remote call to NetrLogonUasLogon (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/01. Remote call to NetrLogonUasLogoff (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/01. Remote call to NetrLogonUasLogoff (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/01. Remote call to NetrLogonUasLogoff (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/01. Remote call to NetrLogonUasLogoff (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/11. Remote call to NetrGetDCName (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/11. Remote call to NetrGetDCName (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/11. Remote call to NetrGetDCName (opnum 11)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/11. Remote call to NetrGetDCName (opnum 11)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/12. Remote call to NetrLogonControl (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/12. Remote call to NetrLogonControl (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/12. Remote call to NetrLogonControl (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/12. Remote call to NetrLogonControl (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/13. Remote call to NetrGetAnyDCName (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/13. Remote call to NetrGetAnyDCName (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/13. Remote call to NetrGetAnyDCName (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/13. Remote call to NetrGetAnyDCName (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/14. Remote call to NetrLogonControl2 (opnum 14)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/14. Remote call to NetrLogonControl2 (opnum 14)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/14. Remote call to NetrLogonControl2 (opnum 14)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/14. Remote call to NetrLogonControl2 (opnum 14)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/18. Remote call to NetrLogonControl2Ex (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/18. Remote call to NetrLogonControl2Ex (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/18. Remote call to NetrLogonControl2Ex (opnum 18)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/18. Remote call to NetrLogonControl2Ex (opnum 18)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/19. Remote call to NetrEnumerateTrustedDomains (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/19. Remote call to NetrEnumerateTrustedDomains (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/19. Remote call to NetrEnumerateTrustedDomains (opnum 19)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/19. Remote call to NetrEnumerateTrustedDomains (opnum 19)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/21. Remote call to NetrLogonGetCapabilities (opnum 21)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/21. Remote call to NetrLogonGetCapabilities (opnum 21)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/21. Remote call to NetrLogonGetCapabilities (opnum 21)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/21. Remote call to NetrLogonGetCapabilities (opnum 21)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/22. Remote call to NetrLogonSetServiceBits (opnum 22)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/22. Remote call to NetrLogonSetServiceBits (opnum 22)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/22. Remote call to NetrLogonSetServiceBits (opnum 22)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/22. Remote call to NetrLogonSetServiceBits (opnum 22)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/23. Remote call to NetrLogonGetTrustRid (opnum 23)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/23. Remote call to NetrLogonGetTrustRid (opnum 23)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/23. Remote call to NetrLogonGetTrustRid (opnum 23)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/23. Remote call to NetrLogonGetTrustRid (opnum 23)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/24. Remote call to NetrLogonComputeServerDigest (opnum 24)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/24. Remote call to NetrLogonComputeServerDigest (opnum 24)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/24. Remote call to NetrLogonComputeServerDigest (opnum 24)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/24. Remote call to NetrLogonComputeServerDigest (opnum 24)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/25. Remote call to NetrLogonComputeClientDigest (opnum 25)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/25. Remote call to NetrLogonComputeClientDigest (opnum 25)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/25. Remote call to NetrLogonComputeClientDigest (opnum 25)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/25. Remote call to NetrLogonComputeClientDigest (opnum 25)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/29. Remote call to NetrLogonGetDomainInfo (opnum 29)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/29. Remote call to NetrLogonGetDomainInfo (opnum 29)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/29. Remote call to NetrLogonGetDomainInfo (opnum 29)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/29. Remote call to NetrLogonGetDomainInfo (opnum 29)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/35. Remote call to NetrLogonGetTimeServiceParentDomain (opnum 35)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/35. Remote call to NetrLogonGetTimeServiceParentDomain (opnum 35)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/35. Remote call to NetrLogonGetTimeServiceParentDomain (opnum 35)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/35. Remote call to NetrLogonGetTimeServiceParentDomain (opnum 35)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/36. Remote call to NetrEnumerateTrustedDomainsEx (opnum 36)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/36. Remote call to NetrEnumerateTrustedDomainsEx (opnum 36)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/36. Remote call to NetrEnumerateTrustedDomainsEx (opnum 36)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/36. Remote call to NetrEnumerateTrustedDomainsEx (opnum 36)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/38. Remote call to DsrGetDcSiteCoverageW (opnum 38)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/38. Remote call to DsrGetDcSiteCoverageW (opnum 38)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/38. Remote call to DsrGetDcSiteCoverageW (opnum 38)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/38. Remote call to DsrGetDcSiteCoverageW (opnum 38)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/40. Remote call to DsrEnumerateDomainTrusts (opnum 40)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/40. Remote call to DsrEnumerateDomainTrusts (opnum 40)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/40. Remote call to DsrEnumerateDomainTrusts (opnum 40)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/40. Remote call to DsrEnumerateDomainTrusts (opnum 40)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/41. Remote call to DsrDeregisterDnsHostRecords (opnum 41)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/41. Remote call to DsrDeregisterDnsHostRecords (opnum 41)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/41. Remote call to DsrDeregisterDnsHostRecords (opnum 41)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/41. Remote call to DsrDeregisterDnsHostRecords (opnum 41)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/43. Remote call to DsrGetForestTrustInformation (opnum 43)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/43. Remote call to DsrGetForestTrustInformation (opnum 43)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/43. Remote call to DsrGetForestTrustInformation (opnum 43)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/43. Remote call to DsrGetForestTrustInformation (opnum 43)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/44. Remote call to NetrGetForestTrustInformation (opnum 44)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/44. Remote call to NetrGetForestTrustInformation (opnum 44)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/44. Remote call to NetrGetForestTrustInformation (opnum 44)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/44. Remote call to NetrGetForestTrustInformation (opnum 44)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/48. Remote call to DsrUpdateReadOnlyServerDnsRecords (opnum 48)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/48. Remote call to DsrUpdateReadOnlyServerDnsRecords (opnum 48)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/48. Remote call to DsrUpdateReadOnlyServerDnsRecords (opnum 48)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/48. Remote call to DsrUpdateReadOnlyServerDnsRecords (opnum 48)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/49. Remote call to NetrChainSetClientAttributes (opnum 49)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/49. Remote call to NetrChainSetClientAttributes (opnum 49)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-NRPC - Netlogon Remote Protocol/49. Remote call to NetrChainSetClientAttributes (opnum 49)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-NRPC - Netlogon Remote Protocol/49. Remote call to NetrChainSetClientAttributes (opnum 49)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/00. Remote call to RpcAsyncOpenPrinter (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/44. Remote call to RpcAsyncAddPrintProcessor (opnum 44)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/44. Remote call to RpcAsyncAddPrintProcessor (opnum 44)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/44. Remote call to RpcAsyncAddPrintProcessor (opnum 44)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/44. Remote call to RpcAsyncAddPrintProcessor (opnum 44)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/63. Remote call to RpcAsyncUploadPrinterDriverPackage (opnum 63)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PAR - Print System Asynchronous Remote Protocol/63. Remote call to RpcAsyncUploadPrinterDriverPackage (opnum 63)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-PLA - Performance Logs and Alerts Protocol/31. Remote call to Extract (opnum 31)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PLA - Performance Logs and Alerts Protocol/31. Remote call to Extract (opnum 31)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-PLA - Performance Logs and Alerts Protocol/31. Remote call to Extract (opnum 31)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-PLA - Performance Logs and Alerts Protocol/31. Remote call to Extract (opnum 31)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/03. Remote call to R_WinsDoStaticInit (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/03. Remote call to R_WinsDoStaticInit (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/03. Remote call to R_WinsDoStaticInit (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/03. Remote call to R_WinsDoStaticInit (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/07. Remote call to R_WinsBackup (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/07. Remote call to R_WinsBackup (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/07. Remote call to R_WinsBackup (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RAIW - Remote Administrative Interface WINS/07. Remote call to R_WinsBackup (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/01. Remote call to RpcOpenPrinter (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/01. Remote call to RpcOpenPrinter (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/01. Remote call to RpcOpenPrinter (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/01. Remote call to RpcOpenPrinter (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/14. Remote call to RpcAddPrintProcessor (opnum 14)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/14. Remote call to RpcAddPrintProcessor (opnum 14)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/14. Remote call to RpcAddPrintProcessor (opnum 14)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/14. Remote call to RpcAddPrintProcessor (opnum 14)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/69. Remote call to RpcOpenPrinterEx (opnum 69)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/69. Remote call to RpcOpenPrinterEx (opnum 69)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RPRN - Print System Remote Protocol/69. Remote call to RpcOpenPrinterEx (opnum 69)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RPRN - Print System Remote Protocol/69. Remote call to RpcOpenPrinterEx (opnum 69)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/00. Remote call to OpenClassesRoot (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/00. Remote call to OpenClassesRoot (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/00. Remote call to OpenClassesRoot (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/00. Remote call to OpenClassesRoot (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/01. Remote call to OpenCurrentUser (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/01. Remote call to OpenCurrentUser (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/01. Remote call to OpenCurrentUser (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/01. Remote call to OpenCurrentUser (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/02. Remote call to OpenLocalMachine (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/02. Remote call to OpenLocalMachine (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/02. Remote call to OpenLocalMachine (opnum 2)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/02. Remote call to OpenLocalMachine (opnum 2)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/03. Remote call to OpenPerformanceData (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/03. Remote call to OpenPerformanceData (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/03. Remote call to OpenPerformanceData (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/03. Remote call to OpenPerformanceData (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/04. Remote call to OpenUsers (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/04. Remote call to OpenUsers (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/04. Remote call to OpenUsers (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/04. Remote call to OpenUsers (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/27. Remote call to OpenCurrentConfig (opnum 27)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/27. Remote call to OpenCurrentConfig (opnum 27)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/27. Remote call to OpenCurrentConfig (opnum 27)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/27. Remote call to OpenCurrentConfig (opnum 27)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/32. Remote call to OpenPerformanceText (opnum 32)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/32. Remote call to OpenPerformanceText (opnum 32)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/32. Remote call to OpenPerformanceText (opnum 32)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/32. Remote call to OpenPerformanceText (opnum 32)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/33. Remote call to OpenPerformanceNlsText (opnum 33)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/33. Remote call to OpenPerformanceNlsText (opnum 33)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-RRP - Windows Remote Registry Protocol/33. Remote call to OpenPerformanceNlsText (opnum 33)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-RRP - Windows Remote Registry Protocol/33. Remote call to OpenPerformanceNlsText (opnum 33)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/00. Remote call to SamrConnect (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/00. Remote call to SamrConnect (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/57. Remote call to SamrConnect2 (opnum 57)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/57. Remote call to SamrConnect2 (opnum 57)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/62. Remote call to SamrConnect4 (opnum 62)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/62. Remote call to SamrConnect4 (opnum 62)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/64. Remote call to SamrConnect5 (opnum 64)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SAMR - Security Account Manager (SAM) Remote Protocol (Client-to-Server)/64. Remote call to SamrConnect5 (opnum 64)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/08. Remote call to NetrConnectionEnum (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/08. Remote call to NetrConnectionEnum (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/08. Remote call to NetrConnectionEnum (opnum 8)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/08. Remote call to NetrConnectionEnum (opnum 8)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/09. Remote call to NetrFileEnum (opnum 9)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/09. Remote call to NetrFileEnum (opnum 9)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/09. Remote call to NetrFileEnum (opnum 9)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/09. Remote call to NetrFileEnum (opnum 9)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/10. Remote call to NetrFileGetInfo (opnum 10)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/10. Remote call to NetrFileGetInfo (opnum 10)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/10. Remote call to NetrFileGetInfo (opnum 10)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/10. Remote call to NetrFileGetInfo (opnum 10)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/11. Remote call to NetrFileClose (opnum 11)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/11. Remote call to NetrFileClose (opnum 11)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/11. Remote call to NetrFileClose (opnum 11)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/11. Remote call to NetrFileClose (opnum 11)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/12. Remote call to NetrSessionEnum (opnum 12)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/12. Remote call to NetrSessionEnum (opnum 12)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/12. Remote call to NetrSessionEnum (opnum 12)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/12. Remote call to NetrSessionEnum (opnum 12)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/13. Remote call to NetrSessionDel (opnum 13)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/13. Remote call to NetrSessionDel (opnum 13)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/13. Remote call to NetrSessionDel (opnum 13)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/13. Remote call to NetrSessionDel (opnum 13)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/14. Remote call to NetrShareAdd (opnum 14)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/14. Remote call to NetrShareAdd (opnum 14)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/14. Remote call to NetrShareAdd (opnum 14)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/14. Remote call to NetrShareAdd (opnum 14)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/15. Remote call to NetrShareEnum (opnum 15)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/15. Remote call to NetrShareEnum (opnum 15)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/15. Remote call to NetrShareEnum (opnum 15)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/15. Remote call to NetrShareEnum (opnum 15)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/16. Remote call to NetrShareGetInfo (opnum 16)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/16. Remote call to NetrShareGetInfo (opnum 16)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/16. Remote call to NetrShareGetInfo (opnum 16)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/16. Remote call to NetrShareGetInfo (opnum 16)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/17. Remote call to NetrShareSetInfo (opnum 17)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/17. Remote call to NetrShareSetInfo (opnum 17)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/17. Remote call to NetrShareSetInfo (opnum 17)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/17. Remote call to NetrShareSetInfo (opnum 17)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/18. Remote call to NetrShareDel (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/18. Remote call to NetrShareDel (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/18. Remote call to NetrShareDel (opnum 18)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/18. Remote call to NetrShareDel (opnum 18)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/19. Remote call to NetrShareDelSticky (opnum 19)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/19. Remote call to NetrShareDelSticky (opnum 19)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/19. Remote call to NetrShareDelSticky (opnum 19)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/19. Remote call to NetrShareDelSticky (opnum 19)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/20. Remote call to NetrShareCheck (opnum 20)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/20. Remote call to NetrShareCheck (opnum 20)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/20. Remote call to NetrShareCheck (opnum 20)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/20. Remote call to NetrShareCheck (opnum 20)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/21. Remote call to NetrServerGetInfo (opnum 21)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/21. Remote call to NetrServerGetInfo (opnum 21)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/21. Remote call to NetrServerGetInfo (opnum 21)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/21. Remote call to NetrServerGetInfo (opnum 21)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/22. Remote call to NetrServerSetInfo (opnum 22)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/22. Remote call to NetrServerSetInfo (opnum 22)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/22. Remote call to NetrServerSetInfo (opnum 22)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/22. Remote call to NetrServerSetInfo (opnum 22)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/23. Remote call to NetrServerDiskEnum (opnum 23)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/23. Remote call to NetrServerDiskEnum (opnum 23)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/23. Remote call to NetrServerDiskEnum (opnum 23)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/23. Remote call to NetrServerDiskEnum (opnum 23)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/24. Remote call to NetrServerStatisticsGet (opnum 24)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/24. Remote call to NetrServerStatisticsGet (opnum 24)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/24. Remote call to NetrServerStatisticsGet (opnum 24)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/24. Remote call to NetrServerStatisticsGet (opnum 24)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/25. Remote call to NetrServerTransportAdd (opnum 25)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/25. Remote call to NetrServerTransportAdd (opnum 25)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/25. Remote call to NetrServerTransportAdd (opnum 25)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/25. Remote call to NetrServerTransportAdd (opnum 25)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/26. Remote call to NetrServerTransportEnum (opnum 26)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/26. Remote call to NetrServerTransportEnum (opnum 26)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/26. Remote call to NetrServerTransportEnum (opnum 26)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/26. Remote call to NetrServerTransportEnum (opnum 26)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/27. Remote call to NetrServerTransportDel (opnum 27)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/27. Remote call to NetrServerTransportDel (opnum 27)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/27. Remote call to NetrServerTransportDel (opnum 27)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/27. Remote call to NetrServerTransportDel (opnum 27)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/28. Remote call to NetrRemoteTOD (opnum 28)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/28. Remote call to NetrRemoteTOD (opnum 28)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/28. Remote call to NetrRemoteTOD (opnum 28)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/28. Remote call to NetrRemoteTOD (opnum 28)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/30. Remote call to NetprPathType (opnum 30)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/30. Remote call to NetprPathType (opnum 30)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/30. Remote call to NetprPathType (opnum 30)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/30. Remote call to NetprPathType (opnum 30)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/31. Remote call to NetprPathCanonicalize (opnum 31)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/31. Remote call to NetprPathCanonicalize (opnum 31)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/31. Remote call to NetprPathCanonicalize (opnum 31)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/31. Remote call to NetprPathCanonicalize (opnum 31)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/32. Remote call to NetprPathCompare (opnum 32)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/32. Remote call to NetprPathCompare (opnum 32)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/32. Remote call to NetprPathCompare (opnum 32)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/32. Remote call to NetprPathCompare (opnum 32)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/33. Remote call to NetprNameValidate (opnum 33)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/33. Remote call to NetprNameValidate (opnum 33)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/33. Remote call to NetprNameValidate (opnum 33)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/33. Remote call to NetprNameValidate (opnum 33)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/34. Remote call to NetprNameCanonicalize (opnum 34)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/34. Remote call to NetprNameCanonicalize (opnum 34)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/34. Remote call to NetprNameCanonicalize (opnum 34)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/34. Remote call to NetprNameCanonicalize (opnum 34)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/35. Remote call to NetprNameCompare (opnum 35)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/35. Remote call to NetprNameCompare (opnum 35)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/35. Remote call to NetprNameCompare (opnum 35)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/35. Remote call to NetprNameCompare (opnum 35)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/36. Remote call to NetrShareEnumSticky (opnum 36)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/36. Remote call to NetrShareEnumSticky (opnum 36)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/36. Remote call to NetrShareEnumSticky (opnum 36)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/36. Remote call to NetrShareEnumSticky (opnum 36)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/37. Remote call to NetrShareDelStart (opnum 37)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/37. Remote call to NetrShareDelStart (opnum 37)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/37. Remote call to NetrShareDelStart (opnum 37)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/37. Remote call to NetrShareDelStart (opnum 37)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/39. Remote call to NetrpGetFileSecurity (opnum 39)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/39. Remote call to NetrpGetFileSecurity (opnum 39)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/39. Remote call to NetrpGetFileSecurity (opnum 39)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/39. Remote call to NetrpGetFileSecurity (opnum 39)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/40. Remote call to NetrpSetFileSecurity (opnum 40)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/40. Remote call to NetrpSetFileSecurity (opnum 40)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/40. Remote call to NetrpSetFileSecurity (opnum 40)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/40. Remote call to NetrpSetFileSecurity (opnum 40)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/41. Remote call to NetrServerTransportAddEx (opnum 41)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/41. Remote call to NetrServerTransportAddEx (opnum 41)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/41. Remote call to NetrServerTransportAddEx (opnum 41)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/41. Remote call to NetrServerTransportAddEx (opnum 41)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/43. Remote call to NetrDfsGetVersion (opnum 43)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/43. Remote call to NetrDfsGetVersion (opnum 43)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/43. Remote call to NetrDfsGetVersion (opnum 43)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/43. Remote call to NetrDfsGetVersion (opnum 43)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/44. Remote call to NetrDfsCreateLocalPartition (opnum 44)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/44. Remote call to NetrDfsCreateLocalPartition (opnum 44)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/44. Remote call to NetrDfsCreateLocalPartition (opnum 44)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/44. Remote call to NetrDfsCreateLocalPartition (opnum 44)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/45. Remote call to NetrDfsDeleteLocalPartition (opnum 45)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/45. Remote call to NetrDfsDeleteLocalPartition (opnum 45)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/45. Remote call to NetrDfsDeleteLocalPartition (opnum 45)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/45. Remote call to NetrDfsDeleteLocalPartition (opnum 45)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/46. Remote call to NetrDfsSetLocalVolumeState (opnum 46)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/46. Remote call to NetrDfsSetLocalVolumeState (opnum 46)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/46. Remote call to NetrDfsSetLocalVolumeState (opnum 46)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/46. Remote call to NetrDfsSetLocalVolumeState (opnum 46)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/48. Remote call to NetrDfsCreateExitPoint (opnum 48)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/48. Remote call to NetrDfsCreateExitPoint (opnum 48)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/48. Remote call to NetrDfsCreateExitPoint (opnum 48)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/48. Remote call to NetrDfsCreateExitPoint (opnum 48)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/49. Remote call to NetrDfsDeleteExitPoint (opnum 49)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/49. Remote call to NetrDfsDeleteExitPoint (opnum 49)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/49. Remote call to NetrDfsDeleteExitPoint (opnum 49)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/49. Remote call to NetrDfsDeleteExitPoint (opnum 49)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/50. Remote call to NetrDfsModifyPrefix (opnum 50)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/50. Remote call to NetrDfsModifyPrefix (opnum 50)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/50. Remote call to NetrDfsModifyPrefix (opnum 50)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/50. Remote call to NetrDfsModifyPrefix (opnum 50)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/51. Remote call to NetrDfsFixLocalVolume (opnum 51)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/51. Remote call to NetrDfsFixLocalVolume (opnum 51)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/51. Remote call to NetrDfsFixLocalVolume (opnum 51)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/51. Remote call to NetrDfsFixLocalVolume (opnum 51)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/52. Remote call to NetrDfsManagerReportSiteInfo (opnum 52)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/52. Remote call to NetrDfsManagerReportSiteInfo (opnum 52)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/52. Remote call to NetrDfsManagerReportSiteInfo (opnum 52)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/52. Remote call to NetrDfsManagerReportSiteInfo (opnum 52)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/53. Remote call to NetrServerTransportDelEx (opnum 53)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/53. Remote call to NetrServerTransportDelEx (opnum 53)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/53. Remote call to NetrServerTransportDelEx (opnum 53)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/53. Remote call to NetrServerTransportDelEx (opnum 53)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/55. Remote call to NetrServerAliasEnum (opnum 55)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/55. Remote call to NetrServerAliasEnum (opnum 55)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/55. Remote call to NetrServerAliasEnum (opnum 55)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/55. Remote call to NetrServerAliasEnum (opnum 55)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/56. Remote call to NetrServerAliasDel (opnum 56)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/56. Remote call to NetrServerAliasDel (opnum 56)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/56. Remote call to NetrServerAliasDel (opnum 56)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/56. Remote call to NetrServerAliasDel (opnum 56)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/57. Remote call to NetrShareDelEx (opnum 57)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/57. Remote call to NetrShareDelEx (opnum 57)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SRVS - Server Service Remote Protocol/57. Remote call to NetrShareDelEx (opnum 57)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SRVS - Server Service Remote Protocol/57. Remote call to NetrShareDelEx (opnum 57)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-SWN - Service Witness Protocol/04. Remote call to WitnessrRegisterEx (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SWN - Service Witness Protocol/04. Remote call to WitnessrRegisterEx (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-SWN - Service Witness Protocol/04. Remote call to WitnessrRegisterEx (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-SWN - Service Witness Protocol/04. Remote call to WitnessrRegisterEx (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/00. Remote call to NetrJobAdd (opnum 0)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/00. Remote call to NetrJobAdd (opnum 0)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/00. Remote call to NetrJobAdd (opnum 0)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/00. Remote call to NetrJobAdd (opnum 0)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/01. Remote call to NetrJobDel (opnum 1)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/01. Remote call to NetrJobDel (opnum 1)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/01. Remote call to NetrJobDel (opnum 1)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/01. Remote call to NetrJobDel (opnum 1)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/02. Remote call to NetrJobEnum (opnum 2)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/02. Remote call to NetrJobEnum (opnum 2)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/02. Remote call to NetrJobEnum (opnum 2)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/02. Remote call to NetrJobEnum (opnum 2)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/03. Remote call to NetrJobGetInfo (opnum 3)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/03. Remote call to NetrJobGetInfo (opnum 3)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/03. Remote call to NetrJobGetInfo (opnum 3)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-TSCH - Task Scheduler Service Remoting Protocol/03. Remote call to NetrJobGetInfo (opnum 3)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-UAMG - Update Agent Management Protocol/18. Remote call to IUpdateServiceManager2 AddService2 (opnum 18)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-UAMG - Update Agent Management Protocol/18. Remote call to IUpdateServiceManager2 AddService2 (opnum 18)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-UAMG - Update Agent Management Protocol/18. Remote call to IUpdateServiceManager2 AddService2 (opnum 18)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-UAMG - Update Agent Management Protocol/18. Remote call to IUpdateServiceManager2 AddService2 (opnum 18)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/04. Remote call to IVdsVdProvider CreateVDisk (opnum 4)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/04. Remote call to IVdsVdProvider CreateVDisk (opnum 4)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/04. Remote call to IVdsVdProvider CreateVDisk (opnum 4)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/04. Remote call to IVdsVdProvider CreateVDisk (opnum 4)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/05. Remote call to IVdsVdProvider AddVDisk (opnum 5)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/05. Remote call to IVdsVdProvider AddVDisk (opnum 5)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/05. Remote call to IVdsVdProvider AddVDisk (opnum 5)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/05. Remote call to IVdsVdProvider AddVDisk (opnum 5)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/08. Remote call to IVdsServiceIscsi SetInitiatorSharedSecret (opnum 8)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-VDS - Virtual Disk Service (VDS) Protocol/08. Remote call to IVdsServiceIscsi SetInitiatorSharedSecret (opnum 8)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-WSRM - Windows System Resource Manager (WSRM) Protocol/07. Remote call to CreateAccountingDb (opnum 7)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-WSRM - Windows System Resource Manager (WSRM) Protocol/07. Remote call to CreateAccountingDb (opnum 7)/README.md -------------------------------------------------------------------------------- /possible-working-calls/MS-WSRM - Windows System Resource Manager (WSRM) Protocol/07. Remote call to CreateAccountingDb (opnum 7)/coerce_poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/MS-WSRM - Windows System Resource Manager (WSRM) Protocol/07. Remote call to CreateAccountingDb (opnum 7)/coerce_poc.py -------------------------------------------------------------------------------- /possible-working-calls/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/p0dalirius/windows-coerced-authentication-methods/HEAD/possible-working-calls/README.md --------------------------------------------------------------------------------