FuzzySecurity / DefCon-Beijing-UAC
Slide deck for DefCon Beijing
☆39Updated 6 years ago
Alternatives and similar repositories for DefCon-Beijing-UAC:
Users that are interested in DefCon-Beijing-UAC are comparing it to the libraries listed below
- CVE-2018-6546-Exploit☆41Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24Updated 5 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆58Updated 5 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 7 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 6 years ago
- New Found 0-days!☆36Updated 5 years ago
- ☆54Updated 6 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆29Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Execute codes From XSLT☆16Updated 8 years ago
- Security Research☆36Updated 3 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 7 years ago
- An example of a downloader written in NodeJS.☆24Updated 3 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 6 years ago
- Exploit the vulnerability to execute the calculator☆68Updated 7 years ago