joren485 / PyWinPrivEsc
Windows Privilege Escalation
☆10Updated 10 years ago
Alternatives and similar repositories for PyWinPrivEsc
Users that are interested in PyWinPrivEsc are comparing it to the libraries listed below
Sorting:
- ☆22Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- ☆54Updated 7 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- ☆24Updated 8 years ago
- Shellcode tracer☆15Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 11 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Random Code Store☆17Updated 2 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago
- ☆58Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago