Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking
-
Updated
May 23, 2020 - C
Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking
Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
A collection of kernel exploits written by me.
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.
Add a description, image, and links to the windows-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploitation topic, visit your repo's landing page and select "manage topics."