0xeb-bp / bluekeepLinks
Public work for CVE-2019-0708
☆292Updated 5 years ago
Alternatives and similar repositories for bluekeep
Users that are interested in bluekeep are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆239Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆326Updated 6 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 4 years ago
- APT34/OILRIG leak☆233Updated 6 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Updated last year
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆242Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- A code demonstrating CVE-2018-0886☆265Updated 4 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆890Updated 5 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- UAC 0day, all day!☆279Updated 7 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- Exploits and advisories☆190Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆260Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 9 months ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆128Updated 6 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆391Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 6 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Updated 3 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆202Updated 5 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆258Updated 4 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆352Updated 6 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago