Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
- http://seclists.org/fulldisclosure/2020/May/34
- https://www.exploit-db.com/exploits/37049/
- https://www.exploit-db.com/exploits/37367/
- https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html
- https://github.com/0xcyberpj/windows-exploitation
- https://github.com/0xpetros/windows-privilage-escalation
- https://github.com/55-AA/CVE-2015-0057
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Anonymous-Family/CVE-2015-1701
- https://github.com/Anonymous-Family/CVE-2015-1701-download
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CrackerCat/Kernel-Security-Development
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Err0r-ICA/Pentest-Tips
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/FULLSHADE/WindowsExploitationResources
- https://github.com/GhostTroops/TOP
- https://github.com/GrapeFruitWolfs/hei
- https://github.com/IAmAnubhavSaini/wes.py3
- https://github.com/IMCG/awesome-c
- https://github.com/JERRY123S/all-poc
- https://github.com/Micr067/K8tools
- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources
- https://github.com/NitroA/windowsexpoitationresources
- https://github.com/NullArray/WinKernel-Resources
- https://github.com/Ondrik8/exploit
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Ratlesv/K8tools
- https://github.com/SeagullGR/k8-2019
- https://github.com/Shadowshusky/k8tool
- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
- https://github.com/SoulSec/Resource-Threat-Intelligence
- https://github.com/TGbusWD/K8tools-20191130
- https://github.com/TamilHackz/windows-exploitation
- https://github.com/YSheldon/New
- https://github.com/amack3131/Devel
- https://github.com/ambynotcoder/C-libraries
- https://github.com/binkeys/k8tools
- https://github.com/blackend/Diario-RedTem
- https://github.com/cc8700619/K8
- https://github.com/code131415/code131415
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d0703887/SINICA-IIS-SummerIntern
- https://github.com/fei9747/WindowsElevation
- https://github.com/gaearrow/windows-lpe-lite
- https://github.com/hfiref0x/CVE-2015-1701
- https://github.com/highandhigh/CVE-2015-0057
- https://github.com/hktalent/TOP
- https://github.com/howknows/awesome-windows-security-development
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/jbmihoub/all-poc
- https://github.com/keshavskn123/CDAC
- https://github.com/liuhe3647/Windows
- https://github.com/loadbxh/K8tools
- https://github.com/lsc1226844309/hanker1
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/lyshark/Windows-exploits
- https://github.com/nvwa-xt/spider
- https://github.com/pandazheng/Threat-Intelligence-Analyst
- https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development
- https://github.com/pravinsrc/NOTES-windows-kernel-links
- https://github.com/puckiestyle/A-Red-Teamer-diaries
- https://github.com/qiantu88/tools
- https://github.com/qq351188606/k8gege
- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs
- https://github.com/renzu0/security-tools
- https://github.com/tronghieu220403/Common-Vulnerabilities-and-Exposures-Reports
- https://github.com/tufanturhan/Red-Teamer-Diaries
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/welove88888/k8
- https://github.com/whitfieldsdad/cisa_kev
- https://github.com/wyrover/win-sys
- https://github.com/ycdxsb/WindowsPrivilegeEscalation