rip1s / CVE-2018-8120
CVE-2018-8120 Windows LPE exploit
☆497Updated 6 years ago
Alternatives and similar repositories for CVE-2018-8120:
Users that are interested in CVE-2018-8120 are comparing it to the libraries listed below
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆424Updated 6 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆541Updated 7 years ago
- CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7☆294Updated 6 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 6 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆328Updated 7 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆487Updated 5 years ago
- Shellcode launcher utility☆476Updated 11 years ago
- 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)☆389Updated 5 years ago
- dump☆491Updated 5 years ago
- Dump various types of Windows credentials without injecting in any process.☆424Updated 2 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆169Updated 8 years ago
- Automated DLL Enumerator☆529Updated 7 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Updated 6 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆601Updated 6 years ago
- tools☆538Updated 5 years ago
- exp of CVE-2018-15982☆181Updated 6 years ago
- ☆164Updated 6 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆167Updated 6 years ago
- This is JSRat.ps1 in Python☆141Updated 8 years ago
- cobaltstrike ms17-010 module and some other☆416Updated 5 years ago
- old blog☆146Updated 3 years ago
- Support ALL Windows Version☆716Updated 4 years ago
- 基于360提出的Ghost Tunnel攻击复现☆134Updated 4 months ago
- bluekeep exploit☆129Updated 3 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆257Updated 3 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 7 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆907Updated 4 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆324Updated 2 years ago
- cobaltstrike xor64.bin补完计划☆135Updated 6 years ago