.. |
alpc_taskscheduler.md
|
Improve the list of potential processes to spawn and inject into to be more believable
|
2021-07-23 12:33:16 -05:00 |
anyconnect_lpe.md
|
Added CVE-2020-3433 module
|
2020-09-25 23:04:58 +02:00 |
appxsvc_hard_link_privesc.md
|
add documentation and module
|
2019-07-08 12:49:22 -05:00 |
bits_ntlm_token_impersonation.md
|
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
|
2021-08-24 16:34:01 -05:00 |
bypassuac_comhijack.md
|
scenario to scenarios
|
2020-01-16 10:36:38 -05:00 |
bypassuac_dotnet_profiler.md
|
scenario to scenarios
|
2020-01-16 10:36:38 -05:00 |
bypassuac_fodhelper.md
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
bypassuac_injection_winsxs.md
|
module doc standardizations
|
2020-01-20 21:41:32 -05:00 |
bypassuac_sdclt.md
|
scenario to scenarios
|
2020-01-16 10:36:38 -05:00 |
bypassuac_silentcleanup.md
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
bypassuac_sluihijack.md
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
bypassuac_windows_store_reg.md
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
canon_driver_privesc.md
|
Further fixes from review and further touch up edits
|
2021-08-09 14:23:05 -05:00 |
comahawk.md
|
scenario to scenarios
|
2020-01-16 10:36:38 -05:00 |
cve_2017_8464_lnk_lpe.md
|
Fix compiling instructions
|
2017-11-08 09:36:32 -06:00 |
cve_2018_8453_win32k_priv_esc.md
|
remove changes to other files
|
2020-04-30 17:19:54 +08:00 |
cve_2019_1458_wizardopium.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
cve_2020_0668_service_tracing.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
cve_2020_0787_bits_arbitrary_file_move.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
cve_2020_0796_smbghost.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
cve_2020_1048_printerdemon.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
cve_2020_1054_drawiconex_lpe.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
cve_2020_1313_system_orchestrator.md
|
remove stray backtick
|
2020-09-25 16:04:46 -05:00 |
cve_2020_1337_printerdemon.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
cve_2020_17136.md
|
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
|
2021-08-24 16:34:01 -05:00 |
cve_2021_21551_dbutil_memmove.md
|
Add targeting for Windows 10 v21H1
|
2021-05-18 12:56:02 -04:00 |
cve_2021_40449.md
|
Fix up changes from timwr's review so long
|
2021-11-09 10:36:50 -06:00 |
cve_2022_3699_lenovo_diagnostics_driver.md
|
Rubocop
|
2023-01-19 13:52:58 -05:00 |
cve_2022_21882_win32k.md
|
Writeup the module metadata and docs
|
2022-02-18 15:23:44 -05:00 |
cve_2022_21999_spoolfool_privesc.md
|
fix module name in output
|
2022-03-14 09:35:56 -05:00 |
cve_2022_26904_superprofile.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
cve_2023_21768_afd_lpe.md
|
Add exploit for CVE-2023-21768
|
2023-03-27 20:08:22 +02:00 |
cve_2023_28252_clfs_driver.md
|
Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md
|
2023-08-30 12:11:37 -04:00 |
dnsadmin_serverlevelplugindll.md
|
Update module documentation with more detail r.e affected versions and the fact that the use of UNC paths could cause an issue if they are not typed in correctly. Also update the module documentation to use the output from recent tests to reflect recent changes. Shortern the module description and update its stability rating. Finally add in a reliability rating for the exploit module.
|
2020-09-10 11:32:45 -05:00 |
docker_credential_wincred.md
|
typo
|
2020-04-24 10:01:31 -05:00 |
druva_insync_insynccphwnet64_rcp_type_5_priv_esc.md
|
Use CVE-2020-5752 path traversal bypass for CVE-2019-3999
|
2020-12-10 12:14:47 +00:00 |
gog_galaxyclientservice_privesc.md
|
modify docs for new output
|
2020-06-15 08:42:27 -05:00 |
lexmark_driver_privesc.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
microfocus_operations_privesc.md
|
fix typos and add default rport
|
2021-04-23 17:38:06 +07:00 |
mov_ss.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
ms10_092_schelevator.md
|
ms10_092_schelevator: Cleanup
|
2022-08-19 15:19:28 +10:00 |
ms16_014_wmi_recv_notif.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
ms16_016_webdav.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
ms16_075_reflection.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
ms16_075_reflection_juicy.md
|
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
|
2020-02-12 08:18:49 +09:00 |
ms16_reflection.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
ms18_8120_win32k_privesc.md
|
caps
|
2020-01-16 11:09:29 -05:00 |
nscp_pe.md
|
intial commit
|
2021-06-09 15:10:03 +02:00 |
ntusermndragover.md
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
panda_psevents.md
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
payload_inject.md
|
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
|
2021-08-24 16:34:01 -05:00 |
persistence_image_exec_options.md
|
Fix message, once more with feeling
|
2020-02-20 11:26:21 -06:00 |
persistence_service.md
|
Doc Formatting
|
2018-12-17 07:34:52 -06:00 |
plantronics_hub_spokesupdateservice_privesc.md
|
Add Plantronics Hub SpokesUpdateService Privilege Escalation
|
2020-01-03 20:13:27 +00:00 |
ps_persist.md
|
add module documentation
|
2016-10-08 20:17:54 -05:00 |
ricoh_driver_privesc.md
|
change method of exploitation for reliability
|
2020-02-06 12:51:36 -06:00 |
service_permissions.md
|
Update the module docs with more details for the registry technique
|
2020-12-08 17:39:34 -05:00 |
srclient_dll_hijacking.md
|
Remove TODO comment, update documentaton to include WAIT_FOR_TIWORKER option.
|
2021-03-15 07:51:12 -04:00 |
tokenmagic.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
unquoted_service_path.md
|
doc how to set permissions on service
|
2023-01-13 17:07:17 -05:00 |
webexec.md
|
added documentation for modules
|
2018-10-24 09:47:05 -05:00 |
win_error_cve_2023_36874.md
|
Update documentation - Options section
|
2023-09-27 15:17:04 +02:00 |
windscribe_windscribeservice_priv_esc.md
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |