DLL Hijacking using DLL Proxying technique
proof-of-concept
exploit
exported-functions
poc
vulnerability
cve
privilege-escalation
mingw-w64
local-privilege-escalation
dll-hijacking
hijacking
windows-privilege-escalation
elevation-of-privilege
dll-proxying
pop-a-shell
-
Updated
Feb 1, 2022 - HTML