Windows Privilege Escalation
-
Updated
Jun 7, 2022
Windows Privilege Escalation
SettingContent-MS File Execution vulnerability in Windows 10
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension
Make hacking Windows easy and without leaving traces
Windows Binary Exploitation Writeups
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
PoC Attack by "search-ms" URI Protocol Handler. Reference: https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
Add a description, image, and links to the windows-exploit topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploit topic, visit your repo's landing page and select "manage topics."