ioncodes / BlueGateLinks
PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610
☆78Updated 5 years ago
Alternatives and similar repositories for BlueGate
Users that are interested in BlueGate are comparing it to the libraries listed below
Sorting:
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- CVE-2020-5837 exploit☆43Updated 5 years ago
- ☆50Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- ☆52Updated 6 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- ☆45Updated 7 years ago
- with metasploit☆63Updated 5 years ago
- ☆43Updated 6 years ago
- ☆25Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- ☆16Updated 5 years ago
- ☆37Updated 7 years ago
- PoC CVE-2020-6308☆37Updated 5 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- ☆62Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Updated 4 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆63Updated 6 years ago