Windows Privilege Escalation
-
Updated
Jun 7, 2022
Windows Privilege Escalation
fud uac-bypass for win 10-11, from user to system
SettingContent-MS File Execution vulnerability in Windows 10
🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher
Windows Binary Exploitation Writeups
A centralized list of the various Potato Windows exploits.
👻 Systematically Seizing SYSTEM Rights — Alternative to PSExec for SYSTEM privilege escalation through token theft.
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
This Metasploit module exploits a vulnerability in WhatsApp for Windows that allows the execution of arbitrary Python or PHP scripts
PoC Attack by "search-ms" URI Protocol Handler. Reference: https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher
Add a description, image, and links to the windows-exploit topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploit topic, visit your repo's landing page and select "manage topics."