metasploit-framework/documentation/modules/exploit/windows/local
h00die 557a15a115 spelling fixes on docs 2023-10-10 14:46:18 -04:00
..
alpc_taskscheduler.md Improve the list of potential processes to spawn and inject into to be more believable 2021-07-23 12:33:16 -05:00
anyconnect_lpe.md Added CVE-2020-3433 module 2020-09-25 23:04:58 +02:00
appxsvc_hard_link_privesc.md add documentation and module 2019-07-08 12:49:22 -05:00
bits_ntlm_token_impersonation.md Address Spencer's comments and remove changes that don't directly use the DLL injection library API change 2021-08-24 16:34:01 -05:00
bypassuac_comhijack.md scenario to scenarios 2020-01-16 10:36:38 -05:00
bypassuac_dotnet_profiler.md scenario to scenarios 2020-01-16 10:36:38 -05:00
bypassuac_fodhelper.md catch false positive spaces at eol from code indent 2020-01-28 14:28:18 -05:00
bypassuac_injection_winsxs.md module doc standardizations 2020-01-20 21:41:32 -05:00
bypassuac_sdclt.md scenario to scenarios 2020-01-16 10:36:38 -05:00
bypassuac_silentcleanup.md catch false positive spaces at eol from code indent 2020-01-28 14:28:18 -05:00
bypassuac_sluihijack.md catch false positive spaces at eol from code indent 2020-01-28 14:28:18 -05:00
bypassuac_windows_store_reg.md catch false positive spaces at eol from code indent 2020-01-28 14:28:18 -05:00
canon_driver_privesc.md Further fixes from review and further touch up edits 2021-08-09 14:23:05 -05:00
comahawk.md scenario to scenarios 2020-01-16 10:36:38 -05:00
cve_2017_8464_lnk_lpe.md Fix compiling instructions 2017-11-08 09:36:32 -06:00
cve_2018_8453_win32k_priv_esc.md remove changes to other files 2020-04-30 17:19:54 +08:00
cve_2019_1458_wizardopium.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
cve_2020_0668_service_tracing.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
cve_2020_0787_bits_arbitrary_file_move.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
cve_2020_0796_smbghost.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
cve_2020_1048_printerdemon.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
cve_2020_1054_drawiconex_lpe.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
cve_2020_1313_system_orchestrator.md remove stray backtick 2020-09-25 16:04:46 -05:00
cve_2020_1337_printerdemon.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
cve_2020_17136.md Address Spencer's comments and remove changes that don't directly use the DLL injection library API change 2021-08-24 16:34:01 -05:00
cve_2021_21551_dbutil_memmove.md Add targeting for Windows 10 v21H1 2021-05-18 12:56:02 -04:00
cve_2021_40449.md Fix up changes from timwr's review so long 2021-11-09 10:36:50 -06:00
cve_2022_3699_lenovo_diagnostics_driver.md Rubocop 2023-01-19 13:52:58 -05:00
cve_2022_21882_win32k.md Writeup the module metadata and docs 2022-02-18 15:23:44 -05:00
cve_2022_21999_spoolfool_privesc.md fix module name in output 2022-03-14 09:35:56 -05:00
cve_2022_26904_superprofile.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
cve_2023_21768_afd_lpe.md Add exploit for CVE-2023-21768 2023-03-27 20:08:22 +02:00
cve_2023_28252_clfs_driver.md Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md 2023-08-30 12:11:37 -04:00
dnsadmin_serverlevelplugindll.md Update module documentation with more detail r.e affected versions and the fact that the use of UNC paths could cause an issue if they are not typed in correctly. Also update the module documentation to use the output from recent tests to reflect recent changes. Shortern the module description and update its stability rating. Finally add in a reliability rating for the exploit module. 2020-09-10 11:32:45 -05:00
docker_credential_wincred.md typo 2020-04-24 10:01:31 -05:00
druva_insync_insynccphwnet64_rcp_type_5_priv_esc.md Use CVE-2020-5752 path traversal bypass for CVE-2019-3999 2020-12-10 12:14:47 +00:00
gog_galaxyclientservice_privesc.md modify docs for new output 2020-06-15 08:42:27 -05:00
lexmark_driver_privesc.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
microfocus_operations_privesc.md fix typos and add default rport 2021-04-23 17:38:06 +07:00
mov_ss.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
ms10_092_schelevator.md ms10_092_schelevator: Cleanup 2022-08-19 15:19:28 +10:00
ms16_014_wmi_recv_notif.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
ms16_016_webdav.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
ms16_075_reflection.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
ms16_075_reflection_juicy.md Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md 2020-02-12 08:18:49 +09:00
ms16_reflection.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
ms18_8120_win32k_privesc.md caps 2020-01-16 11:09:29 -05:00
nscp_pe.md intial commit 2021-06-09 15:10:03 +02:00
ntusermndragover.md Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
panda_psevents.md catch false positive spaces at eol from code indent 2020-01-28 14:28:18 -05:00
payload_inject.md Address Spencer's comments and remove changes that don't directly use the DLL injection library API change 2021-08-24 16:34:01 -05:00
persistence_image_exec_options.md Fix message, once more with feeling 2020-02-20 11:26:21 -06:00
persistence_service.md Doc Formatting 2018-12-17 07:34:52 -06:00
plantronics_hub_spokesupdateservice_privesc.md Add Plantronics Hub SpokesUpdateService Privilege Escalation 2020-01-03 20:13:27 +00:00
ps_persist.md add module documentation 2016-10-08 20:17:54 -05:00
ricoh_driver_privesc.md change method of exploitation for reliability 2020-02-06 12:51:36 -06:00
service_permissions.md Update the module docs with more details for the registry technique 2020-12-08 17:39:34 -05:00
srclient_dll_hijacking.md Remove TODO comment, update documentaton to include WAIT_FOR_TIWORKER option. 2021-03-15 07:51:12 -04:00
tokenmagic.md spelling fixes on docs 2023-10-10 14:46:18 -04:00
unquoted_service_path.md doc how to set permissions on service 2023-01-13 17:07:17 -05:00
webexec.md added documentation for modules 2018-10-24 09:47:05 -05:00
win_error_cve_2023_36874.md Update documentation - Options section 2023-09-27 15:17:04 +02:00
windscribe_windscribeservice_priv_esc.md spelling fixes on docs 2023-10-10 14:46:18 -04:00