gaearrow / windows-lpe-lite
windows Local privilege escalation for xp sp3+ (x86/x64)
☆12Updated 7 years ago
Alternatives and similar repositories for windows-lpe-lite:
Users that are interested in windows-lpe-lite are comparing it to the libraries listed below
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- ☆45Updated 6 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆31Updated 4 years ago
- ☆15Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Synaptics Audio Driver LPE☆37Updated 5 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 4 months ago
- My conference presentations and publications☆26Updated 2 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- ☆23Updated 8 years ago
- cve-2019-0808-poc☆48Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- ☆22Updated 3 years ago
- Rekall Memory Forensic Framework☆30Updated 5 years ago
- ☆14Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- ☆25Updated 6 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- crash poc & Leak info PoC☆18Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 4 years ago