CVE-2020-1337 Windows Print Spooler Privilege Escalation
☆152Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2020-1337-exploit
Users that are interested in CVE-2020-1337-exploit are comparing it to the libraries listed below
Sorting:
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Aug 13, 2020Updated 5 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- double-free bug in WhatsApp exploit poc☆268Mar 19, 2021Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Nov 14, 2019Updated 6 years ago
- backdoor☆262Jul 26, 2025Updated 7 months ago
- ☆1,380Jul 2, 2020Updated 5 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Jun 1, 2023Updated 2 years ago
- Windows EoP Bugs☆127Jun 9, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆130Aug 13, 2020Updated 5 years ago
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Dec 5, 2021Updated 4 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆364Jan 11, 2020Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Privilege Escalation Via RpcSs svc☆180Dec 10, 2021Updated 4 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- WINDOWS TELEMETRY权限维持☆257Jul 2, 2020Updated 5 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Nov 20, 2019Updated 6 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆277Apr 16, 2020Updated 5 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆117May 2, 2022Updated 3 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆556Jul 3, 2020Updated 5 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Jul 20, 2018Updated 7 years ago