irsl / CVE-2020-1313View external linksLinks
Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
☆125Jul 30, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1313
Users that are interested in CVE-2020-1313 are comparing it to the libraries listed below
Sorting:
- ☆152Jan 7, 2020Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- ☆272Jul 10, 2023Updated 2 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 5 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆330May 3, 2020Updated 5 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Oct 2, 2020Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- Managed assembly shellcode generation☆280Mar 19, 2021Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- POC for cve-2019-1458☆179Jan 17, 2022Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Aug 13, 2020Updated 5 years ago
- CVE-2019-0708 (BlueKeep)☆111Jul 7, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- collect for learning cases☆595Jun 16, 2024Updated last year
- Evade sysmon and windows event logging☆624Apr 8, 2020Updated 5 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Mar 18, 2024Updated last year
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago