atredispartners / CVE-2018-0952-SystemCollector
PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service
☆108Updated 6 years ago
Related projects: ⓘ
- ☆67Updated this week
- ☆43Updated this week
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆107Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆108Updated 3 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- Poc for CVE-2019-1253☆154Updated 2 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- ☆86Updated this week
- POC for Cobalt Strike external C2☆121Updated 3 years ago
- UAC Bypass with mmc via alpc☆155Updated 5 years ago
- ☆132Updated this week
- A tool to run .Net DLLs from the command line☆100Updated 5 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Updated 6 years ago
- sploit☆67Updated 4 years ago
- CVE-2019-0604☆132Updated 5 years ago
- ☆65Updated this week
- Aggregation of Cobalt Strike's aggressor scripts.☆144Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆228Updated last year
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆108Updated 3 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 5 years ago
- ☆58Updated this week
- CVE-2019-0859 1day Exploit☆120Updated 4 years ago
- POC for CVE-2018-0824☆85Updated last year
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Updated 7 years ago
- ☆79Updated this week
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago