monoxgas / TrebuchetLinks
MS15-076 Privilege Escalation
☆101Updated 10 years ago
Alternatives and similar repositories for Trebuchet
Users that are interested in Trebuchet are comparing it to the libraries listed below
Sorting:
- ☆164Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- Proof of Concept exploit for CVE-2017-8570☆184Updated 7 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- ☆94Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 8 years ago
- Support x86 and x64☆66Updated 4 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆109Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆175Updated 8 years ago
- CVE20178570☆95Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- Small modification version of p0wnedShell☆40Updated 9 years ago
- ☆142Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- ☆86Updated 2 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆270Updated 7 years ago
- Heartbleed (CVE-2014-0160) client exploit☆323Updated 9 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 8 years ago
- Use CLR to inject all the .NET apps☆183Updated 4 years ago
- ☆90Updated 4 years ago
- MS17-010 exploits, payloads, and scanners☆94Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Post module for Metasploit to execute ELF in memory☆86Updated 6 years ago
- ☆35Updated 9 years ago