Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
-
Updated
Jun 6, 2020 - C++
Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
DLL Hijacking Detection Tool
Simple hook tool to change Win32 program font.
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM
Weaponizing for privileged file writes bugs with windows problem reporting
Exploit of RealVNC VNC Server
Undetected DLL Injection Method
UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and FuzzySecurity for their efforts
A header-only DLL proxy stub generation library built with C++20.
Bypass Windows UAC Tool
Visit https://github.com/0x80000000 for the newer version of this library.
Using a proxy d3d11 dll and function hooking to inject triangle drawing code into Skyrim
A dll hijacking vulnerability in zoom meeting < 5.1.4. CVE-2020-9767
Add a description, image, and links to the dll-hijacking topic page so that developers can more easily learn about it.
To associate your repository with the dll-hijacking topic, visit your repo's landing page and select "manage topics."