St0rn / Windows-10-Exploit
Windows 10 Exploit
☆30Updated 6 years ago
Alternatives and similar repositories for Windows-10-Exploit:
Users that are interested in Windows-10-Exploit are comparing it to the libraries listed below
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- ☆15Updated 9 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- ☆13Updated 3 years ago
- ☆21Updated 5 years ago
- ☆25Updated 6 years ago
- Discover MSSQL Instances via UDP Scanning☆23Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- ☆54Updated 6 years ago
- ☆15Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 9 months ago
- Security Advisories☆10Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- Random source codes☆25Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- ☆11Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago