Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service.
☆90Feb 19, 2026Updated last month
Alternatives and similar repositories for CVE-2026-20817
Users that are interested in CVE-2026-20817 are comparing it to the libraries listed below
Sorting:
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated last month
- Just another EDR killer☆132Jan 21, 2026Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Impacket☆50Feb 25, 2026Updated 3 weeks ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆77Mar 10, 2026Updated last week
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- ☆58Nov 18, 2024Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆69Jan 19, 2026Updated 2 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- ☆19Nov 26, 2024Updated last year
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 2 months ago
- ☆267Jul 8, 2025Updated 8 months ago
- ☆39Nov 25, 2025Updated 3 months ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆21Dec 1, 2021Updated 4 years ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆229Apr 12, 2025Updated 11 months ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆82Jun 19, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- An example of a client and server using Windows' ALPC functions to send and receive data.☆117Jan 21, 2025Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆107Jan 21, 2026Updated last month
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- ☆12Aug 31, 2022Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago