CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)
☆14Jun 7, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2016-0040
Users that are interested in CVE-2016-0040 are comparing it to the libraries listed below
Sorting:
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- ☆22May 25, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A useful IDA Notepad plug-in that can completely replace IDA’s native Notepad window.☆34Dec 3, 2024Updated last year
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 9 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- ☆14May 13, 2018Updated 7 years ago
- Security introduction book☆23Jan 10, 2016Updated 10 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- RemoveApiSets is a program that can replace the ApiSets Dlls that already depend on ApiSets Dlls with MSVCR14X Dlls☆33Oct 6, 2024Updated last year
- ☆49Jan 11, 2019Updated 7 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 3 months ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- A simple tool to find offsets needed in 32bit jailbreaks. Feel free to contribute.☆31Sep 1, 2017Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Develop UEFI applications using EDK II inside Visual Studio☆12Jan 5, 2025Updated last year
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Tools for diffing and comparing web content. Also includes a web server that makes diffs available as an HTTP service.☆18Updated this week
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆83Mar 15, 2017Updated 8 years ago
- POC of sysenter x64 LSTAR MSR hook☆41Jul 20, 2014Updated 11 years ago
- Local Privilege Escalation for macOS 10.12.2 via mach_voucher and XNU port Feng Shui☆94Feb 21, 2019Updated 7 years ago