padovah4ck / CVE-2019-0986View external linksLinks
Security Research
☆36Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2019-0986
Users that are interested in CVE-2019-0986 are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- CVE-2019-0859 1day Exploit☆120Feb 11, 2020Updated 6 years ago
- ☆18Feb 6, 2019Updated 7 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- ☆166May 1, 2019Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Apr 3, 2019Updated 6 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Apache Tomcat Remote Code Execution on Windows☆189Nov 27, 2019Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 2 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Dec 28, 2019Updated 6 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- ☆164May 18, 2018Updated 7 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆24Mar 25, 2025Updated 10 months ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago