RythmStick / CVE-2019-1064
CVE-2019-1064 Local Privilege Escalation Vulnerability
☆24Updated 5 years ago
Alternatives and similar repositories for CVE-2019-1064:
Users that are interested in CVE-2019-1064 are comparing it to the libraries listed below
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆35Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Updated 4 years ago
- ☆53Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆49Updated 4 years ago
- ☆37Updated 7 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Updated 4 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- PoC to interact with local/remote registry hives through WMI☆85Updated 4 years ago
- ☆45Updated 6 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 7 years ago
- Helper script for mangling CS payloads☆51Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 4 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆62Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- ☆70Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆110Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 6 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year