umarfarook882 / Win-LocalPriv-Escalation-polarbear
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
☆15Updated 5 years ago
Alternatives and similar repositories for Win-LocalPriv-Escalation-polarbear
Users that are interested in Win-LocalPriv-Escalation-polarbear are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- ☆11Updated 6 years ago
- Persistent through COM Hijacking☆21Updated 6 years ago
- POC code to crash Windows Event Logger Service☆26Updated 4 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Win32k Elevation of Privilege Poc☆1Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 5 years ago
- Random source codes☆25Updated 4 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- ☆13Updated 7 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- XOR crypt/decrypt using C#☆12Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆35Updated 5 years ago
- Automate AV evasion by calling AMSI☆88Updated last year
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- PoC code from blog☆16Updated 5 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- CVE-2020-5837 exploit☆41Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆45Updated 6 years ago