CVE-2020-1337 Windows Print Spooler Privilege Escalation
☆152Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2020-1337-exploit
Users that are interested in CVE-2020-1337-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Aug 13, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- backdoor☆262Jul 26, 2025Updated 7 months ago
- Windows EoP Bugs☆127Jun 9, 2020Updated 5 years ago
- ☆1,379Jul 2, 2020Updated 5 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆130Aug 13, 2020Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Dec 10, 2021Updated 4 years ago
- double-free bug in WhatsApp exploit poc☆268Mar 19, 2021Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Jul 17, 2020Updated 5 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Dec 5, 2021Updated 4 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆351Nov 14, 2019Updated 6 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Nov 20, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- weaponized tool for CVE-2020-17144☆158Dec 9, 2020Updated 5 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 6 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆63Jun 1, 2023Updated 2 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- A little tool to play with Kerberos.☆66Apr 10, 2023Updated 2 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- PoC exploits for CVE-2020-17382☆116Oct 2, 2020Updated 5 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆117May 2, 2022Updated 3 years ago
- fastjson 1.2.68 版本 autotype bypass☆142Jun 17, 2022Updated 3 years ago