umarfarook882 / Win-LocalPriv-Escalation-polarbearLinks
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
☆15Updated 6 years ago
Alternatives and similar repositories for Win-LocalPriv-Escalation-polarbear
Users that are interested in Win-LocalPriv-Escalation-polarbear are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- POC code to crash Windows Event Logger Service☆26Updated 4 years ago
- ☆22Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- C# AV bypass jank☆32Updated 4 years ago
- medium-rare☆28Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated 2 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆13Updated 7 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Updated 2 years ago
- ☆11Updated 6 years ago
- ☆43Updated 5 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Display Languages Volatile Environment LPE☆10Updated 6 months ago
- Persistent through COM Hijacking☆21Updated 6 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Updated 7 months ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- A simple injector that uses LoadLibraryA☆18Updated 4 years ago