PCAUSA Rawether for Windows Local Privilege Escalation
-
Updated
Mar 15, 2017 - C++
PCAUSA Rawether for Windows Local Privilege Escalation
DLL Hijacking Detection Tool
Execute commands as local system.
Interactive Post Exploitation Tool
Disable Ctrl+Alt+Del hotkey
Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.
Proof of concept for different Windows vulnerabilities
PoC demonstrating the use of cve-2020-1034 for privilege escalation
A dll injector static library for Win x64 processes with handle elevation supported
x64 Windows privilege elevation using anycall
Bypass UAC by abusing the Internet Explorer Add-on installer
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing shell protocol handlers
Bypass UAC by hijacking a DLL located in the Native Image Cache
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Simple DLL that add a user to the local Administrators group
Incomplete project
lpe poc for cve-2022-21882
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."