Edubr2020 / CVE-2021-40444--CABless
Modified code so that we don´t need to rely on CAB archives
☆101Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40444--CABless:
Users that are interested in CVE-2021-40444--CABless are comparing it to the libraries listed below
- This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit☆171Updated 3 years ago
- Exploit for CVE-2021-40449☆52Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- Privilege Escalation Via RpcSs svc☆173Updated 3 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆40Updated 3 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆465Updated 3 years ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆284Updated 2 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- windows 10 14393 LPE☆94Updated 3 years ago
- Windows Common Log File System Driver POC☆94Updated 3 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- ☆124Updated 2 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆148Updated 3 years ago
- ☆52Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆97Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆171Updated last year
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago
- ☆63Updated 2 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago
- adding a backdooruser using win32api☆79Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆132Updated 4 years ago
- ☆165Updated 3 years ago
- From directory deletion to SYSTEM shell☆111Updated 4 years ago