Windows Privilege Escalation
-
Updated
Jun 7, 2022
Windows Privilege Escalation
SettingContent-MS File Execution vulnerability in Windows 10
HACK ANY Windows, Linux , Android, iOS, Unix, device EASILY WITH THIS PRIVATE SILENT JPG EXPLOIT.
Make hacking Windows easy and without leaving traces
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension
Windows Binary Exploitation Writeups
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
This Metasploit module exploits a vulnerability in WhatsApp for Windows that allows the execution of arbitrary Python or PHP scripts
PoC Attack by "search-ms" URI Protocol Handler. Reference: https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
Add a description, image, and links to the windows-exploit topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploit topic, visit your repo's landing page and select "manage topics."