There are no reviews yet. Be the first to send feedback to the community and the maintainers!
PrivescCheck
Privilege Escalation Enumeration Script for WindowsPrintSpoofer
Abusing Impersonation Privileges on Windows 10 and Server 2019VBA-RunPE
A VBA implementation of the RunPE technique or how to bypass application whitelisting.PPLdump
Dump the memory of a PPL with a userland exploitPerfusion
Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)UsoDllLoader
Windows - Weaponizing privileged file writes with the Update Session Orchestrator serviceFullPowers
Recover the default privilege set of a LOCAL/NETWORK SERVICE accountPPLmedic
Dump the memory of any PPL with a Userland exploit chainPPLcontrol
Controlling Windows PP(L)sBitsArbitraryFileMove
Microsoft Windows BITS Arbitrary File Move Local Privilege EscalationCDPSvcDllHijacking
Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEMPentest-Windows
Windows internals and exploitation tricksPentest-Tools
Some random tools I use for penetration testingDiagTrackAribtraryFileRead
Microsoft Windows DiagTrack 'UtcApi_DownloadLatestSettings' Arbitrary File ReadCVEs
Random CVEsitm4n
itm4n.github.io
Personal blogLove Open Source and this site? Check out how you can help us