umarfarook882 / Win-LocalPriv-Escalation-polarbearView external linksLinks
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
☆17May 22, 2019Updated 6 years ago
Alternatives and similar repositories for Win-LocalPriv-Escalation-polarbear
Users that are interested in Win-LocalPriv-Escalation-polarbear are comparing it to the libraries listed below
Sorting:
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Reuploading the code she removed.☆14May 27, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Plugin-based obfuscator☆14Jun 13, 2019Updated 6 years ago
- Secure licensing solution for .NET☆14Jul 6, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- Socks 5 proxy☆12Aug 5, 2023Updated 2 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- Windows x86 PE Packer In C++☆51Nov 18, 2019Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Oct 27, 2019Updated 6 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆110Oct 2, 2018Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Windows toolkits☆17Apr 25, 2023Updated 2 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago