exploitblizzard / Windows-Privilege-Escalation-CVE-2021-1732
Read my blog for more info -
β32Updated 3 years ago
Related projects β
Alternatives and complementary repositories for Windows-Privilege-Escalation-CVE-2021-1732
- π» Windows 10 Kernel-mode rootkitβ31Updated 2 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched Β―\_(γ)_/Β―β40Updated 2 years ago
- Bypass UAC by abusing shell protocol handlersβ13Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.β18Updated last year
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBootβ59Updated last year
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.β29Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installerβ50Updated 3 years ago
- Process Hollowing demonstration & explanationβ32Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.β41Updated 3 years ago
- A kernel mode Windows rootkit in development.β49Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.β89Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwrittiβ¦β38Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Processβ74Updated 2 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variablesβ27Updated 3 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antivirusesβ40Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progressβ11Updated 2 years ago
- Recreating and reviewing the Windows persistence methodsβ39Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1β31Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.β67Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/systemβ10Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmapβ17Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handlerβ26Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.β100Updated last year
- NT AUTHORITY\SYSTEMβ38Updated 4 years ago
- Small handy tool for crafting shellcodes by hand.β18Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryptionβ77Updated last year