Windows Privilege Escalation
-
Updated
Jun 7, 2022
Windows Privilege Escalation
SettingContent-MS File Execution vulnerability in Windows 10
fud uac-bypass for win 10-11
Make hacking Windows easy and without leaving traces
Windows Binary Exploitation Writeups
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension
A centralized list of the various Potato Windows exploits.
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
This Metasploit module exploits a vulnerability in WhatsApp for Windows that allows the execution of arbitrary Python or PHP scripts
PoC Attack by "search-ms" URI Protocol Handler. Reference: https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
Add a description, image, and links to the windows-exploit topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploit topic, visit your repo's landing page and select "manage topics."