A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit this vulnerability by injecting malicious code into the Atom Table and hijacking a legitimate thread to execute the code in the context of a higher privileged process.
☆31Sep 18, 2024Updated last year
Alternatives and similar repositories for Windows-Atom-Table-Hijacking
Users that are interested in Windows-Atom-Table-Hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 3 months ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated 3 months ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- One-time pad encryption command line tool - OT7.☆19Jul 9, 2016Updated 9 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆13Feb 12, 2024Updated 2 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- WinLogon I/O (LogonUI) Plugin for PowerRemoteDesktop☆29Feb 3, 2022Updated 4 years ago
- Go实现用于Windows系统的进程隐藏工具,通过DLL注入技术将指定进程从任务管理器中隐藏☆26Jan 22, 2026Updated 3 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Feb 3, 2023Updated 3 years ago
- A flight tracker in your command line.☆26Feb 13, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- How to set up and install Ss7 and Sigtran Adapt☆36May 19, 2024Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆35Jun 9, 2023Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- 获取浏览器保存密码,支持IE、Chrome和火狐☆12Oct 30, 2019Updated 6 years ago
- 复现K360☆15Apr 5, 2025Updated last year
- ☆19Jan 31, 2023Updated 3 years ago
- ☆14Apr 8, 2026Updated 3 weeks ago
- ☆22Jan 15, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 3 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- QGIS Tools to capture and zoom to MGRS coordinates.☆23Jun 10, 2024Updated last year
- ☆15Mar 3, 2025Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago