exploitblizzard / Windows-Privilege-Escalation-CVE-2021-1732View external linksLinks
Read my blog for more info -
☆31Apr 27, 2021Updated 4 years ago
Alternatives and similar repositories for Windows-Privilege-Escalation-CVE-2021-1732
Users that are interested in Windows-Privilege-Escalation-CVE-2021-1732 are comparing it to the libraries listed below
Sorting:
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆17May 22, 2019Updated 6 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- ☆20Jul 27, 2020Updated 5 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 4 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Windows Minidump loader for Ghidra☆29Sep 30, 2022Updated 3 years ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆67Sep 11, 2021Updated 4 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Aug 1, 2021Updated 4 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆66Aug 14, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- internal splitgate cheat. esp only, good base☆10Aug 22, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Sep 12, 2022Updated 3 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Anti-Debugger to stop multiple malicious tools and hooks on your software.☆66Aug 31, 2019Updated 6 years ago
- ☆72Feb 28, 2023Updated 2 years ago
- ☆23May 23, 2024Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Mar 23, 2024Updated last year