jamf / CVE-2020-0796-RCE-POC
CVE-2020-0796 Remote Code Execution POC
☆549Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0796-RCE-POC:
Users that are interested in CVE-2020-0796-RCE-POC are comparing it to the libraries listed below
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆339Updated 3 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,315Updated 4 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆185Updated 5 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Shellcode wrapper with encryption for multiple target languages☆436Updated 8 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆903Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆1,074Updated 4 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆540Updated 4 years ago
- Exploit for zerologon cve-2020-1472☆651Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆908Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆737Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆930Updated 7 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆759Updated last year
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆385Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆727Updated last year
- Support ALL Windows Version☆715Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,475Updated last year
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,681Updated 6 months ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆417Updated 3 years ago
- Cobalt Strike Shellcode Generator☆654Updated 2 months ago
- Sudo Baron Samedit Exploit☆743Updated 3 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆951Updated last year
- PoC for triggering buffer overflow via CVE-2020-0796☆324Updated 2 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆602Updated 6 months ago
- Some useful scripts for CobaltStrike☆842Updated 4 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,100Updated 8 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,072Updated last year