• Stars
    star
    40
  • Rank 680,660 (Top 14 %)
  • Language
  • Created over 5 years ago
  • Updated about 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

learning case to prepare OSWE

More Repositories

1

UAC_Bypass_In_The_Wild

Windows 10 UAC bypass for all executable files which are autoelevate true .
C
621
star
2

awesome_windows_logical_bugs

collect for learning cases
VBScript
544
star
3

UAC_bypass_windows_store

Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
C
263
star
4

CdpSvcLPE

Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
C++
247
star
5

cve-2020-1337-poc

poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)
PowerShell
174
star
6

RpcSsImpersonator

Privilege Escalation Via RpcSs svc
C
166
star
7

WerTrigger

Weaponizing for privileged file writes bugs with windows problem reporting
C++
150
star
8

magnifier0day

Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking
C
135
star
9

SpoolTrigger

Weaponizing for privileged file writes bugs with PrintNotify Service
PowerShell
126
star
10

Fileless_UAC_bypass_WSReset

I created the python script to bypass UAC to get system shell .
Python
115
star
11

delete2SYSTEM

Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
C
111
star
12

PrintNightmare-LPE

CVE-2021-1675 (PrintNightmare)
C++
75
star
13

tokenx_privEsc

with metasploit
Python
63
star
14

eternal-pulsar

Eternalblue-Doublepulsar without Metasploit or python
Python
49
star
15

cve-2022-21882-poc

lpe poc for cve-2022-21882
C++
48
star
16

SECOMN_EoP

Sound Research SECOMN service Privilege Escalation (windows 10)
Batchfile
40
star
17

amd_eop_poc

CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)
Batchfile
29
star
18

windows-stuff

my learning case about windows
20
star
19

FileWrite2system

File Write Weapon for Privilege Escalation To get SYSTEM
PowerShell
20
star
20

misc-bin

testing123
PowerShell
11
star
21

origin_client_LPE

Ea's Origin Client LPE
PowerShell
9
star
22

JustFunctions

Dangerous Functions of Programming Languages
4
star
23

Windows_System_Programming

my learning journey of windows system programmings
C
4
star
24

app-sec-checklist

checklist for Application penetration Testing
4
star
25

wp_app_dllhijack_poc

C
3
star
26

NP_impersonate

priv esc for SeImpersonatePrivilege
C
3
star
27

sec_checklist_bag

Security Checklist for Industry
3
star
28

playing-with-privileged-tokens

just my learning cases
C++
3
star
29

offsecWE-prepare

my learning case for OSWE prepare
PHP
3
star
30

pyauthy

Script for Twilio Authy Two-Factor Authentication (2FA)
Python
2
star
31

xApp

Shell
2
star
32

trash-bin

test123
2
star
33

MyNotes

Notes
2
star
34

awe-win-expx

noted
1
star
35

mozilla-security-checklist

Mozilla - Security Checklist #noted
1
star
36

assem

my learning case for assembly
C
1
star