rip1s / CVE-2019-1458View external linksLinks
CVE-2019-1458 Windows LPE Exploit
☆135Mar 11, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2019-1458
Users that are interested in CVE-2019-1458 are comparing it to the libraries listed below
Sorting:
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- POC for cve-2019-1458☆179Jan 17, 2022Updated 4 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- an impacket-dependent script exploiting CVE-2019-1040☆72Jan 1, 2021Updated 5 years ago
- DLLhijack winmm.dll☆116May 20, 2024Updated last year
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆258Oct 29, 2021Updated 4 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆717Aug 3, 2021Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 5 years ago
- Weblogic coherence.jar RCE☆176May 10, 2020Updated 5 years ago
- ☆1,376Jul 2, 2020Updated 5 years ago
- anti AV☆293Mar 12, 2020Updated 5 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆523Jul 9, 2020Updated 5 years ago
- cve-2020-0688☆330Jul 4, 2023Updated 2 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Nov 14, 2019Updated 6 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- 读取登录过本机的登录失败或登录成功的所有计算机信息,在内网渗透中快速定位运维管理人员。☆221Sep 30, 2019Updated 6 years ago
- 📧Coremail邮件系统组织通讯录导出脚本☆158Sep 28, 2021Updated 4 years ago
- X86 version of syswhispers2 / x86 direct system call☆330Jan 28, 2021Updated 5 years ago
- ☆28Mar 26, 2020Updated 5 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- A native backdoor module for Microsoft IIS (Internet Information Services)☆559Jul 3, 2020Updated 5 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆205May 25, 2021Updated 4 years ago