forrest-orr / DoubleStarLinks
A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques
☆146Updated 3 years ago
Alternatives and similar repositories for DoubleStar
Users that are interested in DoubleStar are comparing it to the libraries listed below
Sorting:
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- ☆52Updated 4 years ago
- Inter-Process Communication Mechanisms☆28Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.