exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files from SandboxEscaper

First Active2018-08-28
Last Active2019-06-07
Microsoft Windows AppX Deployment Service Local Privilege Escalation
Posted Jun 7, 2019
Authored by SandboxEscaper

Microsoft Windows AppX Deployment Service local privilege escalation exploit that bypasses CVE-2019-0841.

tags | exploit, local
systems | windows
advisories | CVE-2019-0841
MD5 | 43733e1bfd2813c8c8435759734658e7
Microsoft Windows AppX Deployment Service Local Privilege Escalation
Posted May 29, 2019
Authored by SandboxEscaper

Microsoft Windows suffers from a deployment service local privilege escalation vulnerability that bypasses the fix for CVE-2019-0841.

tags | exploit, local
systems | windows
advisories | CVE-2019-0841
MD5 | e4ec8b1e55e88e54ab69d43fb7183685
Microsoft Windows Installer Race Condition
Posted May 24, 2019
Authored by SandboxEscaper

Microsoft Windows installer suffers from a race condition that can allow for privilege escalation.

tags | exploit
systems | windows
MD5 | 9a503f8035f1c995cef77978e81633e9
Internet Explorer JavaScript Privilege Escalation
Posted May 23, 2019
Authored by SandboxEscaper

Internet Explorer 11 exploit that allows attackers to execute JavaScript with higher system access than is normally permitted by the browser sandbox.

tags | exploit, javascript
advisories | CVE-2019-0841
MD5 | 935c249a0cf1e2fa49afb683f0e4aa80
Angry Polar Bear 2: Microsoft Windows Error Reporting Local Privilege Escalation
Posted May 23, 2019
Authored by SandboxEscaper

Angry Polar Bear 2 is a Microsoft Windows error reporting privilege escalation exploit.

tags | exploit
systems | windows
advisories | CVE-2019-0863
MD5 | e2a7c2229624d5b912617778c52d6a08
Microsoft Windows Task Scheduler .job Import Arbitrary DACL Write
Posted May 22, 2019
Authored by SandboxEscaper

Microsoft Windows task scheduler .job import arbitrary DACL write proof of concept exploit.

tags | exploit, arbitrary, proof of concept
systems | windows
MD5 | 52b9f1fd108ce77586d458c8e25878fb
Microsoft Windows Error Reporting Local Privilege Escalation
Posted Jan 9, 2019
Authored by SandboxEscaper

Angry Polar Bear is a Microsoft Windows error reporting privilege escalation exploit.

tags | exploit
systems | windows
MD5 | ee7fca66252eae44b2c5ca2e9081020d
Microsoft Data Sharing Local Privilege Escalation
Posted Oct 24, 2018
Authored by SandboxEscaper

Microsoft Data Sharing local privilege escalation proof of concept exploit.

tags | exploit, local, proof of concept
MD5 | 19b3b9b54f750224bfd2143dfd869414
Microsoft Windows ALPC Task Scheduler Local Privilege Elevation
Posted Sep 22, 2018
Authored by Jacob Robles, bwatters-r7, SandboxEscaper, asoto-r7 | Site metasploit.com

On vulnerable versions of Windows the alpc endpoint method SchRpcSetSecurity implemented by the task scheduler service can be used to write arbitrary DACLs to .job files located in c:\windows\tasks because the scheduler does not use impersonation when checking this location. Since users can create files in the c:\windows\tasks folder, a hardlink can be created to a file the user has read access to. After creating a hardlink, the vulnerability can be triggered to set the DACL on the linked file. WARNING: The PrintConfig.dll (%windir%\system32\driverstor\filerepository\prnms003*) on the target host will be overwritten when the exploit runs. This Metasploit module has been tested against Windows 10 Pro x64.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2018-8440
MD5 | 75182edcb972e293d73fef17dd332fcc
Microsoft Windows ALPC Local Privilege Escalation
Posted Aug 28, 2018
Authored by SandboxEscaper

Microsoft Windows Advanced Local Procedure Call (ALPC) local privilege escalation exploit.

tags | exploit, local
systems | windows
MD5 | dd5537a9a63d2a59cbd7132605107e01
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    7 Files
  • 19
    Oct 19th
    1 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close