https://blog.xpnsec.com/windows-warbird-privesc/
☆31Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for warbird_exploit
Users that are interested in warbird_exploit are comparing it to the libraries listed below
Sorting:
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Hyper-V sockets☆29Sep 11, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and …☆16Jul 20, 2024Updated last year
- ☆14Feb 14, 2018Updated 8 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Cross-platform proxy resolution library written in C.☆17Updated this week
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆13Jun 20, 2013Updated 12 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- ☆13May 31, 2023Updated 2 years ago
- My research environment based off of Microsoft's Singularity RDK/ Verve.☆16Nov 27, 2016Updated 9 years ago
- Team Portfolio. PLAYERUNKNOWN'S BATTLEGROUNDS(a.k.a. PUBG) Imitation Game's Proto Type.☆16Aug 12, 2018Updated 7 years ago
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 4 months ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Sep 2, 2018Updated 7 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆132Jul 16, 2023Updated 2 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session☆18Jun 6, 2019Updated 6 years ago
- ☆19Aug 30, 2017Updated 8 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago