umarfarook882 / Win-LocalPriv-Escalation-polarbearLinks
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
☆16Updated 6 years ago
Alternatives and similar repositories for Win-LocalPriv-Escalation-polarbear
Users that are interested in Win-LocalPriv-Escalation-polarbear are comparing it to the libraries listed below
Sorting:
- C# AV bypass jank☆33Updated 4 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- medium-rare☆28Updated 5 years ago
- Automate AV evasion by calling AMSI☆87Updated 2 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- Several self-defense shellcodes☆23Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- ☆43Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk