win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
- http://www.exploit-db.com/exploits/24485
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Crunchy0/Win_exploits
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/nitishbadole/oscp-note-2
- https://github.com/rmsbpro/rmsbpro
- https://github.com/ycdxsb/WindowsPrivilegeEscalation