0x00-0x00 / CVE-2019-1064
CVE-2019-1064 Local Privilege Escalation Vulnerability
☆11Updated 5 years ago
Alternatives and similar repositories for CVE-2019-1064:
Users that are interested in CVE-2019-1064 are comparing it to the libraries listed below
- ☆11Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆30Updated 5 years ago
- CreateProcessAsUser experiments☆6Updated 9 years ago
- Installs And Executes Shellcode☆11Updated 9 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- An AV evasion PoC tool☆9Updated 7 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 5 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 5 years ago
- C# Implementation of Get-VaultCredential☆13Updated 6 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Kill AMSI in a remote process PoC☆10Updated 6 years ago
- ☆54Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 2 years ago
- ☆45Updated 6 years ago
- Quick Proof of Concept for reading a processes memory and searching for a specific string.☆10Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- ☆12Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- Hide Mimikatz From Process Lists☆17Updated 9 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago