worawit / CVE-2019-0708View external linksLinks
CVE-2019-0708 (BlueKeep)
☆111Jul 7, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2019-0708
Users that are interested in CVE-2019-0708 are comparing it to the libraries listed below
Sorting:
- sploit☆67Dec 21, 2019Updated 6 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- guest→system(UAC手动提权)☆73Mar 18, 2020Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Public work for CVE-2019-0708☆291Nov 19, 2019Updated 6 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Jun 13, 2020Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Nov 14, 2019Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 5 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆359Updated this week
- CVE-2018-13382☆147Aug 13, 2019Updated 6 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- ☆63Sep 10, 2019Updated 6 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆200Sep 13, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- it works on xp (all version sp2 sp3)☆75Sep 30, 2019Updated 6 years ago