uf0o / CVE-2020-17382Links
PoC exploits for CVE-2020-17382
☆115Updated 4 years ago
Alternatives and similar repositories for CVE-2020-17382
Users that are interested in CVE-2020-17382 are comparing it to the libraries listed below
Sorting:
- CVE-2019-1458 Windows LPE Exploit☆136Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆122Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Steal privileged token to obtain SYSTEM shell☆250Updated 5 years ago
- CVE-2019-0708 (BlueKeep)☆111Updated 5 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- ☆71Updated 4 years ago
- ☆37Updated 7 years ago
- JScript RAT☆101Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- just test☆65Updated 2 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago
- Exchange2010 authorized RCE☆156Updated 4 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- RDI implementation in Nim☆64Updated 4 years ago
- ☆35Updated 2 years ago
- Shellcode injection POC using syscalls.☆116Updated 5 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Updated 4 years ago
- a patched sshd for red team activities☆82Updated 3 years ago
- Some private tools i decided to release for public.☆49Updated last year
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago