Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
☆124Jul 30, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1313
Users that are interested in CVE-2020-1313 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆151Jan 7, 2020Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- PoC for CVE-2020-1015☆40May 16, 2020Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- ☆270Jul 10, 2023Updated 2 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Jun 17, 2020Updated 5 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆406Jun 6, 2020Updated 5 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 5 years ago
- PoC exploits for CVE-2020-17382☆116Oct 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆233Feb 20, 2020Updated 6 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 6 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- POC for cve-2019-1458☆180Jan 17, 2022Updated 4 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- ☆21Mar 16, 2021Updated 5 years ago
- Dump of win32k POCs for bugs I've found