adobe_sandbox_adobecollabsync.rb | 14 KB | |
agnitum_outpost_acs.rb | 5.4 KB | |
alpc_taskscheduler.rb | 3.5 KB | |
always_install_elevated.rb | 4.3 KB | |
anyconnect_lpe.rb | 11.9 KB | |
applocker_bypass.rb | 4.9 KB | |
appxsvc_hard_link_privesc.rb | 4.8 KB | |
ask.rb | 1.7 KB | |
bits_ntlm_token_impersonation.rb | 12.1 KB | |
bthpan.rb | 7.2 KB | |
bypassuac.rb | 5.3 KB | |
bypassuac_comhijack.rb | 8 KB | |
bypassuac_dotnet_profiler.rb | 8.2 KB | |
bypassuac_eventvwr.rb | 7.1 KB | |
bypassuac_fodhelper.rb | 8 KB | |
bypassuac_injection.rb | 9.2 KB | |
bypassuac_injection_winsxs.rb | 16.5 KB | |
bypassuac_sdclt.rb | 6.3 KB | |
bypassuac_silentcleanup.rb | 4.5 KB | |
bypassuac_sluihijack.rb | 7.9 KB | |
bypassuac_vbs.rb | 4.4 KB | |
bypassuac_windows_store_filesys.rb | 5.3 KB | |
bypassuac_windows_store_reg.rb | 6 KB | |
canon_driver_privesc.rb | 5.7 KB | |
capcom_sys_exec.rb | 4.2 KB | |
comahawk.rb | 5.9 KB | |
current_user_psexec.rb | 5.8 KB | |
cve_2017_8464_lnk_lpe.rb | 8.1 KB | |
cve_2018_8453_win32k_priv_esc.rb | 4.3 KB | |
cve_2019_1458_wizardopium.rb | 5.2 KB | |
cve_2020_0668_service_tracing.rb | 12.9 KB | |
cve_2020_0787_bits_arbitrary_file_move.rb | 13.2 KB | |
cve_2020_0796_smbghost.rb | 4.2 KB | |
cve_2020_1048_printerdemon.rb | 7.6 KB | |
cve_2020_1054_drawiconex_lpe.rb | 4.3 KB | |
cve_2020_1313_system_orchestrator.rb | 6.8 KB | |
cve_2020_1337_printerdemon.rb | 7 KB | |
cve_2020_17136.rb | 12.1 KB | |
cve_2021_21551_dbutil_memmove.rb | 4.3 KB | |
cve_2021_40449.rb | 8.8 KB | |
cve_2022_21882_win32k.rb | 5.8 KB | |
cve_2022_21999_spoolfool_privesc.rb | 13.5 KB | |
cve_2022_26904_superprofile.rb | 16.1 KB | |
cve_2022_3699_lenovo_diagnostics_driver.rb | 3.9 KB | |
cve_2023_21768_afd_lpe.rb | 3.5 KB | |
cve_2023_28252_clfs_driver.rb | 5.8 KB | |
cve_2024_30088_authz_basep.rb | 7.2 KB | |
dnsadmin_serverlevelplugindll.rb | 15.8 KB | |
docker_credential_wincred.rb | 3.6 KB | |
druva_insync_insynccphwnet64_rcp_type_5_priv_esc.rb | 5.5 KB | |