monoxgas / TrebuchetLinks
MS15-076 Privilege Escalation
☆100Updated 9 years ago
Alternatives and similar repositories for Trebuchet
Users that are interested in Trebuchet are comparing it to the libraries listed below
Sorting:
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- ☆164Updated 7 years ago
- ☆93Updated 7 years ago
- Proof of Concept exploit for CVE-2017-8570☆186Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 7 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆109Updated 6 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- Support x86 and x64☆66Updated 4 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- CVE20178570☆96Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- ☆86Updated last year
- Small modification version of p0wnedShell☆40Updated 9 years ago
- ☆142Updated 8 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Updated 4 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆270Updated 7 years ago
- POC for CVE-2018-0824☆87Updated 2 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 9 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Use CLR to inject all the .NET apps☆184Updated 4 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- Post module for Metasploit to execute ELF in memory☆87Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- my public code☆166Updated 8 years ago