Name: backlion
Type: User
Company: 渗透测试研究中心公众号【渗透测试研究中心】
Bio: Penetration Testing,WEB Security Research,Red Team, penetration testing and Research Center --->>http://www.cnblogs.com/backlion
Location: **成都
Blog: http://www.cnblogs.com/backlion
backlion's Projects
Simple script for the WHID injector - a rubberducky wifi
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
wiki
WgpSec 公开POC WIKI文库 @PeiQi0 师傅
🚄 火车上写的,2015年的代码和数据了
Windows 10 and Server 2016 Secure Baseline Group Policy
Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())
Public mirror for win32-pr
Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
windows-kernel-exploits Windows平台提权漏洞集合
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
Windows Privilege Escalation Techniques and Scripts
The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.
Simple windows rpc server for research purposes only
Microsoft » Windows 10 : Security Vulnerabilities
My pentest tools used two years ago. Part1
PoC code to extract private keys from Windows 10's built in ssh-agent service
A list of all the DLLs export in C:\windows\system32\
Windows提权辅助工具
Undetectable Windows Payload Generation
Auto install WinPcap on Windows(command line)
Automation for internal Windows Penetrationtest / AD-Security
💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques
Powershell-based Windows Security Auditing Toolbox
A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.