ExpLife0011 / CVE-2019-0803
Win32k Elevation of Privilege Poc
☆80Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2019-0803
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- cve-2018-8453 exp☆120Updated 4 years ago
- ☆127Updated 5 years ago
- CVE-2019-0859 1day Exploit☆120Updated 4 years ago
- POC for CVE-2018-0824☆85Updated 2 years ago
- Win32k Exploit by Grant Willcox☆88Updated 5 years ago
- POC and exploitation of vulnerabilities☆90Updated 2 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 4 years ago
- ☆89Updated 3 years ago
- Small tool to load shellcodes or PEs to analyze them☆80Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆108Updated 6 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Updated 6 years ago
- ☆163Updated 6 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆82Updated 3 years ago
- Use CLR to inject all the .NET apps☆182Updated 3 years ago
- cve-2019-0808-poc☆47Updated 5 years ago
- win32k use-after-free poc☆70Updated 4 years ago
- Stealing passwords every time they change☆63Updated 4 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 6 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- ☆147Updated 4 years ago
- Support x86 and x64☆66Updated 3 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆109Updated 3 years ago
- a pass-the-hash tool