worawit / CVE-2019-0708
CVE-2019-0708 (BlueKeep)
☆107Updated 4 years ago
Alternatives and similar repositories for CVE-2019-0708:
Users that are interested in CVE-2019-0708 are comparing it to the libraries listed below
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- sploit☆68Updated 5 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 4 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 5 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆144Updated 5 years ago
- ☆30Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Security Support Provider Interface☆46Updated 4 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Updated 5 years ago
- guest→system(UAC手动提权)☆74Updated 4 years ago
- proxylogon exploit - CVE-2021-26857☆112Updated 3 years ago
- CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulne…☆17Updated 3 years ago
- Proof-of-concept code for various bugs☆108Updated 4 months ago
- ☆128Updated 5 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆30Updated 4 years ago
- just test☆65Updated 2 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Updated 4 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- An interactive webshell and HTTP tunnel for TCP connections using chunked transfer encoding☆50Updated 6 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 3 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago