at0mik / CVE-2019-0708-PoC
CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack.
☆17Updated 3 years ago
Alternatives and similar repositories for CVE-2019-0708-PoC:
Users that are interested in CVE-2019-0708-PoC are comparing it to the libraries listed below
- proxylogon exploit - CVE-2021-26857☆112Updated 3 years ago
- CVE-2019-0708 (BlueKeep)☆107Updated 4 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆247Updated 4 years ago
- ☆30Updated 5 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- JScript RAT☆99Updated 4 years ago
- Security Support Provider Interface☆46Updated 4 years ago
- Exchange2010 authorized RCE☆155Updated 4 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- ShellCode Loader for MSF and Cobalt Strike☆54Updated 9 months ago
- gui uac bypass (netplwiz.exe)☆64Updated 5 years ago
- weaponized tool for CVE-2020-17144☆161Updated 4 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Privilege Escalation Via RpcSs svc☆176Updated 3 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- SQL Server Management Studio(SSMS) saved password dumper☆113Updated 2 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆79Updated 4 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 5 years ago
- bypass uac☆142Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆144Updated 5 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆30Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 3 years ago