v-p-b / kaspy_toolzView external linksLinks
☆46Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for kaspy_toolz
Users that are interested in kaspy_toolz are comparing it to the libraries listed below
Sorting:
- ☆28Dec 28, 2017Updated 8 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Jun 11, 2019Updated 6 years ago
- Installs And Executes Shellcode☆11Jul 26, 2015Updated 10 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- CVE-2019-0859 1day Exploit☆120Feb 11, 2020Updated 6 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14May 26, 2019Updated 6 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 5 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- WD My Cloud PoC exploit☆41May 22, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- This is a place to share my miscellaneous projects.☆116May 2, 2020Updated 5 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- Stealthy backdoor for Windows operating systems☆284Feb 13, 2020Updated 6 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆200Sep 13, 2019Updated 6 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 2 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago