8000 GitHub - franckferman/SYSTEMatic: ๐Ÿ‘ป Systematically Seizing SYSTEM Rights โ€” Alternative to PSExec for SYSTEM privilege escalation through token theft.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

๐Ÿ‘ป Systematically Seizing SYSTEM Rights โ€” Alternative to PSExec for SYSTEM privilege escalation through token theft.

License

Notifications You must be signed in to change notification settings

franckferman/SYSTEMatic

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

3 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Contributors Forks Stargazers Issues License

SYSTEMatic Logo

๐Ÿ‘ป SYSTEMatic

From Administrator to NT AUTHORITY\SYSTEM in one shot.
Systematically Seizing SYSTEM Rights โ€” Alternative to PSExec for SYSTEM privilege escalation through token theft.

๐Ÿ“œ Table of Contents

Click to collapse/expand
  1. ๐Ÿ“– About
  2. ๐ŸŽฎ Usage
  3. โš–๏ธ Legal Disclaimer
  4. ๐ŸŒ  Star Evolution
  5. ๐Ÿ“œ License
  6. ๐Ÿ“ž Contact

๐Ÿ“– About

SYSTEMatic is a C-based Proof of Concept (PoC) that demonstrates Windows privilege escalation using token impersonation. By identifying a SYSTEM process and duplicating its token, SYSTEMatic provides an interactive SYSTEM shell (cmd.exe), offering direct SYSTEM-level access from an Administrator session.

SYSTEMatic Demo Screenshot

๐Ÿš€ Objective: A modern, lightweight alternative to PSExec, focused on token impersonation techniques for security research, penetration testing, red team operations, and system administration tasks requiring SYSTEM privileges.

โœจ Features

  • โœ… Spawn a SYSTEM shell (cmd.exe) from Administrator privileges.
  • โœ… Token hunting, duplication, and impersonation using pure WinAPI.
  • โœ… Lightweight and modular C source code.

โš™๏ธ A true alternative to PSExec, aimed at security researchers, pentesters, red teamers, and system administrators looking for direct SYSTEM access.

โš ๏ธ Disclaimer & Operational Security (OPSEC)

Important notice for users:

  • โŒ Do NOT upload compiled binaries (e.g., SYSTEMatic.exe) to public analysis platforms such as VirusTotal, Any.run, Hybrid Analysis, or similar services.
  • ๐Ÿšจ These platforms share submitted files with antivirus vendors, which will likely lead to rapid detection, signature creation, and reduced effectiveness of the tool in real-world scenarios.

โœ… If you need to analyze or test the binary, use isolated, private labs or offline environments to avoid unintentional exposure.

(๐Ÿ”ผ Back to top)

๐ŸŽฎ Usage

โš™๏ธ Running SYSTEMatic

โš ๏ธ Note: SYSTEMatic requires Administrator privileges to execute successfully.

โœ… Step-by-Step Instructions

  1. Open a terminal as Administrator (Command Prompt or PowerShell):
  • Right-click on "Command Prompt" or "PowerShell" โ†’ Run as administrator.
  1. Run SYSTEMatic:
.\SYSTEMatic.exe
  1. If successful, you will get an elevated SYSTEM shell (cmd.exe) running as NT AUTHORITY\SYSTEM:
Microsoft Windows [Version 10.0.26100.3194]
(c) Microsoft Corporation. All rights reserved.

C:\Windows\System32>whoami
nt authority\system

C:\Windows\System32>

๐Ÿ’ก Tip: SYSTEMatic automatically finds and duplicates a SYSTEM token โ€” no additional commands or options are needed.

(๐Ÿ”ผ Back to top)

โš–๏ธ Legal Disclaimer

SYSTEMatic is provided strictly for security research, educational, and academic purposes. Its primary aim is to help security professionals, system administrators, and researchers better understand Windows token manipulation and privilege escalation mechanisms.

โš ๏ธ Warning: This tool must never be used for unauthorized activities or against systems for which you do not have explicit permission. Unauthorized use may violate laws and result in criminal and civil penalties.

If you are unsure about the legality of your intended use, consult a legal professional or competent authority before proceeding.

๐Ÿ”น By using SYSTEMatic, you acknowledge that you have read, understood, and agreed to this disclaimer.

You accept that the author cannot be held responsible for any misuse or damage caused by this tool.

(๐Ÿ”ผ Back to top)

๐ŸŒ  Star Evolution

Explore the star history of this project and see how it has evolved over time:

Star History Chart

Your support is greatly appreciated. We're grateful for every star! Your backing fuels our passion. โœจ

๐Ÿ“š License

This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub

(๐Ÿ”ผ Back to top)

๐Ÿ“ž Contact

ProtonMail LinkedIn Twitter

(๐Ÿ”ผ Back to top)

0