There are no reviews yet. Be the first to send feedback to the community and the maintainers!
iscsicpl_bypassUAC
UAC bypass for x64 Windows 7 - 11exploits
exploits and proof-of-concept vulnerability demonstration files from the team at Hacker HouseMarble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.SignToolEx
Patching "signtool.exe" to accept expired certificates for code-signing.Stinger
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.OffensiveLua
Offensive Lua.Artillery
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.ColorDataProxyUACBypass
Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 & up.WMIProcessWatcher
A CIA tradecraft technique to asynchronously detect when a process is created using WMI.tools
A collection of tools created for computer security research purposes.cve-2018-10933
cve-2018-10933 libssh authentication bypassbackdoors
Tools for maintaining access to systems and proof-of-concept demonstrations.CompMgmtLauncher_DLL_UACBypass
CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDriveMsSettingsDelegateExecute
Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.pyongyang_2407
Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. This repository contains installation instructions, hardware documentation and exploits for disabling censorship tools of North Korea Android.envschtasksuacbypass
Bypass UAC elevation on Windows 8 (build 9600) & above.documents
Papers, presentations and documents from the team at Hacker House.shellcode
shellcode are codes designed to be injected into the memory space of another process during exploitation.electionhacking
Diebold Accuvote-TSx Election Machine HackingNoFaxGiven
Code Execution & Persistence in NETWORK SERVICE FAX ServiceGigabyte_ElevatePersist
Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming and performance PC's. A UAC elevation vulnerability exists that can be used for persistence in a novel fashion.AESCrypt
AES-256 Microsoft Cryptography API Example Use.rebirth
rebirth IOS11 - 11.3.1 jailbreak security research utilityhackerhouse-opensource
Github profilehfioquake3_DoS
ioquake3 engine is vulnerable to a remotely exploitable off-by-one overflow due to a miscalculated array index within the privileged admin console command banaddr. Attacker needs the rcon password to exploit this vulnerability.Love Open Source and this site? Check out how you can help us