shubham0d / CVE-2020-1301Links
POC exploit for SMBLost vulnerability (CVE-2020-1301)
☆17Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1301
Users that are interested in CVE-2020-1301 are comparing it to the libraries listed below
Sorting:
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 6 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Updated 5 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- Injects HTML/PHP/ASP to the PE☆103Updated 5 years ago
- Tool to test for existence of CVE-2020-8218☆22Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- ☆71Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 5 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- DO NOT RUN THIS.☆10Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Proof-of-concept code for various bugs☆110Updated last year
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆62Updated 5 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 2 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Updated 5 years ago