sailay1996 / UAC_bypass_windows_store
Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
☆263Updated 4 years ago
Related projects: ⓘ
- I created the python script to bypass UAC to get system shell .☆118Updated 5 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆210Updated 6 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆242Updated 4 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆113Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆244Updated 4 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆169Updated 4 years ago
- exe2powershell - exe2bat reborn for modern Windows☆165Updated 3 years ago
- Use CLR to inject all the .NET apps☆183Updated 3 years ago
- ☆116Updated this week
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆336Updated 2 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆375Updated 4 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆255Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆317Updated 4 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆327Updated 2 years ago
- Win32k Elevation of Privilege Poc☆80Updated 5 years ago
- CVE-2019-1458 Windows LPE Exploit☆134Updated 4 years ago
- Create a minidump of the LSASS process from memory☆254Updated last year
- ☆258Updated last year
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆119Updated 4 years ago
- Programmatically create an administrative user under Windows☆177Updated 7 years ago
- ☆347Updated 2 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆136Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆342Updated 4 years ago
- Poc for CVE-2019-1253☆154Updated 2 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆109Updated last year
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆331Updated last year
- cve-2018-8453 exp☆120Updated 4 years ago
- Windows UAC Bypass☆96Updated 5 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆323Updated 3 years ago