CVE-2019-1388 Abuse UAC Windows Certificate Dialog
☆20May 6, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2019-1388
Users that are interested in CVE-2019-1388 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Mar 6, 2019Updated 7 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 6 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Synthesising graphs and simulating things☆10Oct 25, 2022Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆21Jul 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python exploit for the backdoor left in vsftpd 2.3.4☆35Mar 21, 2018Updated 8 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- My solutions and writeups for the CTF challenges hosted @ backdoor.sdslabs.co☆10Oct 23, 2017Updated 8 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- ☆18Jul 26, 2019Updated 6 years ago
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- ERPNext / Frappe Framework MariaDB configuration file☆16Jun 22, 2021Updated 4 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python tool to generate password permutations from keywords☆16Oct 6, 2023Updated 2 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- ☆18Feb 20, 2019Updated 7 years ago
- Motor de búsqueda para filtrar por todas las máquinas de HackTheBox que s4vitar ha hecho.☆12Dec 8, 2022Updated 3 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 8 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- handy powershell scripts☆66Oct 29, 2024Updated last year
- guest→system(UAC手动提权)☆74Mar 18, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- A Flutter app. Hans Wehr Dictionary is an Arabic to English Dictionary. Should ideally work on android, iOS, Linux, Windows, mac, web. Te…☆21Dec 6, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CVE-2022-0847 POC☆15Mar 14, 2022Updated 4 years ago
- Simple Crud php mysql bootstrap 5 utilizando xampp☆14Aug 25, 2021Updated 4 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆20Sep 2, 2021Updated 4 years ago