• Stars
    star
    544
  • Rank 81,699 (Top 2 %)
  • Language VBScript
  • Created almost 5 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

collect for learning cases

awesome_windows_logical_bugs

Created this repo for the people who want to learn about windows logical privilege escalation bugs.
And also I added some of my findings. You can contact me via @404death to add good article which I missed.
work in progress (WIP) , I'm always update this repo when the new bugs release.

Escalation of Privileges (Vulnerabilities and Other Research):

Privileged File Operations Bugs To SYSTEM shell (Techniques):

Service account to SYSTEM privilege (Token Impersonation) :

Tools:

Research by James Forshaw / Google Project Zero

Thank to:

@tiraniddo @SandboxBear @jonasLyk @itm4n @decoder_it @enigma0x3 @padovah4ck @clavoillotte @PsiDragon @edwardzpeng

suggestion : If you want to deep dive about windows, go first to Windows Internal ebook

More Repositories

1

UAC_Bypass_In_The_Wild

Windows 10 UAC bypass for all executable files which are autoelevate true .
C
621
star
2

UAC_bypass_windows_store

Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
C
263
star
3

CdpSvcLPE

Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
C++
247
star
4

cve-2020-1337-poc

poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)
PowerShell
174
star
5

RpcSsImpersonator

Privilege Escalation Via RpcSs svc
C
166
star
6

WerTrigger

Weaponizing for privileged file writes bugs with windows problem reporting
C++
150
star
7

magnifier0day

Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking
C
135
star
8

SpoolTrigger

Weaponizing for privileged file writes bugs with PrintNotify Service
PowerShell
126
star
9

Fileless_UAC_bypass_WSReset

I created the python script to bypass UAC to get system shell .
Python
115
star
10

delete2SYSTEM

Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
C
111
star
11

PrintNightmare-LPE

CVE-2021-1675 (PrintNightmare)
C++
75
star
12

tokenx_privEsc

with metasploit
Python
63
star
13

eternal-pulsar

Eternalblue-Doublepulsar without Metasploit or python
Python
49
star
14

cve-2022-21882-poc

lpe poc for cve-2022-21882
C++
48
star
15

offsec_WE

learning case to prepare OSWE
40
star
16

SECOMN_EoP

Sound Research SECOMN service Privilege Escalation (windows 10)
Batchfile
40
star
17

amd_eop_poc

CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)
Batchfile
29
star
18

windows-stuff

my learning case about windows
20
star
19

FileWrite2system

File Write Weapon for Privilege Escalation To get SYSTEM
PowerShell
20
star
20

misc-bin

testing123
PowerShell
11
star
21

origin_client_LPE

Ea's Origin Client LPE
PowerShell
9
star
22

JustFunctions

Dangerous Functions of Programming Languages
4
star
23

Windows_System_Programming

my learning journey of windows system programmings
C
4
star
24

app-sec-checklist

checklist for Application penetration Testing
4
star
25

wp_app_dllhijack_poc

C
3
star
26

NP_impersonate

priv esc for SeImpersonatePrivilege
C
3
star
27

sec_checklist_bag

Security Checklist for Industry
3
star
28

playing-with-privileged-tokens

just my learning cases
C++
3
star
29

offsecWE-prepare

my learning case for OSWE prepare
PHP
3
star
30

pyauthy

Script for Twilio Authy Two-Factor Authentication (2FA)
Python
2
star
31

xApp

Shell
2
star
32

trash-bin

test123
2
star
33

MyNotes

Notes
2
star
34

awe-win-expx

noted
1
star
35

mozilla-security-checklist

Mozilla - Security Checklist #noted
1
star
36

assem

my learning case for assembly
C
1
star