Windows Privilege Escalation
-
Updated
Jun 7, 2022
Windows Privilege Escalation
SettingContent-MS File Execution vulnerability in Windows 10
🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension
Windows Binary Exploitation Writeups
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
PoC Attack by "search-ms" URI Protocol Handler. Reference: https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
Add a description, image, and links to the windows-exploit topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploit topic, visit your repo's landing page and select "manage topics."