Proof of concept for different Windows vulnerabilities
-
Updated
Nov 14, 2020 - C++
Proof of concept for different Windows vulnerabilities
Uses the microsoft-signed truesight.sys to escalate privileges
Local privilege escalation on Windows by abusing CMSTP to bypass User Access Control (UAC)
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Trojan written in C++ for Windows
Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.
A dll injector static library for Win x64 processes with handle elevation supported
Bypass UAC by abusing shell protocol handlers
Disable Ctrl+Alt+Del hotkey
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
x64 Windows privilege elevation using anycall
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Exploit of RealVNC VNC Server
Interactive Post Exploitation Tool
PCAUSA Rawether for Windows Local Privilege Escalation
lpe poc for cve-2022-21882
Bypass UAC by abusing the Internet Explorer Add-on installer
Execute commands as local system.
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."