CVE-2019-1388 Abuse UAC Windows Certificate Dialog
☆20May 6, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2019-1388
Users that are interested in CVE-2019-1388 are comparing it to the libraries listed below
Sorting:
- ☆16Mar 6, 2019Updated 7 years ago
- https://github.com/sagishahar/lpeworkshop☆10Sep 19, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆21Jul 18, 2023Updated 2 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Python exploit for the backdoor left in vsftpd 2.3.4☆35Mar 21, 2018Updated 7 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- My solutions and writeups for the CTF challenges hosted @ backdoor.sdslabs.co☆10Oct 23, 2017Updated 8 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- ☆18Jul 26, 2019Updated 6 years ago
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- ERPNext / Frappe Framework MariaDB configuration file☆16Jun 22, 2021Updated 4 years ago
- GUI Osint Framework with Kali Linux☆172Apr 12, 2023Updated 2 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Motor de búsqueda para filtrar por todas las máquinas de HackTheBox que s4vitar ha hecho.☆12Dec 8, 2022Updated 3 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- guest→system(UAC手动提权)☆74Mar 18, 2020Updated 6 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- A Flutter app. Hans Wehr Dictionary is an Arabic to English Dictionary. Should ideally work on android, iOS, Linux, Windows, mac, web. Te…☆21Dec 6, 2025Updated 3 months ago
- ☆23Nov 18, 2015Updated 10 years ago
- Simple Crud php mysql bootstrap 5 utilizando xampp☆14Aug 25, 2021Updated 4 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Exploit to dump ipmi hashes☆37Apr 21, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago