joren485 / PyWinPrivEsc
Windows Privilege Escalation
☆10Updated 10 years ago
Alternatives and similar repositories for PyWinPrivEsc:
Users that are interested in PyWinPrivEsc are comparing it to the libraries listed below
- ☆22Updated 7 years ago
- A simple reflective dll example☆19Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- Introduce you to shellcode development.☆23Updated 8 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- ☆54Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 3 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- ☆24Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆45Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆43Updated 7 years ago
- powershell to hide process by kd.exe☆32Updated 3 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆57Updated 7 years ago