umarfarook882 / Win-LocalPriv-Escalation-polarbear
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
☆15Updated 5 years ago
Alternatives and similar repositories for Win-LocalPriv-Escalation-polarbear:
Users that are interested in Win-LocalPriv-Escalation-polarbear are comparing it to the libraries listed below
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆22Updated 3 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- PoC code from blog☆16Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- ☆13Updated 7 years ago
- ☆45Updated 6 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Updated last year
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- ☆14Updated 5 years ago
- ☆54Updated 6 years ago
- An AV evasion PoC tool☆9Updated 7 years ago