CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation
☆83Mar 13, 2019Updated 7 years ago
Alternatives and similar repositories for SdoKeyCrypt-sys-local-privilege-elevation
Users that are interested in SdoKeyCrypt-sys-local-privilege-elevation are comparing it to the libraries listed below
Sorting:
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- ☆46Jun 14, 2018Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- A tool that helps you get system shell without UAC prompt☆50Oct 8, 2018Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- ☆18May 18, 2018Updated 7 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago