gaearrow / windows-lpe-lite
windows Local privilege escalation for xp sp3+ (x86/x64)
☆12Updated 6 years ago
Related projects: ⓘ
- ☆16Updated this week
- ☆36Updated this week
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆13Updated 5 years ago
- ☆15Updated 4 years ago
- ☆13Updated 4 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- ☆27Updated this week
- Reverse Windows shell over TLS☆18Updated 8 years ago
- ☆40Updated this week
- ☆24Updated 5 years ago
- ☆31Updated 4 years ago
- ☆31Updated this week
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 4 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- ACTIVELabs Security Advisories☆21Updated 3 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 5 years ago
- cve-2019-0808-poc☆47Updated 5 years ago
- ☆35Updated 5 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Updated 6 years ago
- ☆11Updated this week
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 5 years ago
- ☆19Updated this week
- UIAccess UAC Bypass using token duplication and keyboard events☆25Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆47Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last week
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆32Updated 4 years ago