• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

com

  1. dEEpEst

    C/C++ comon - a WinDbg extension to trace COM

    comon - a WinDbg extension to trace COM Comon is a WinDbg extension that can help you trace COM interactions (COM class creations and interface querying). You may use it to investigate various COM issues and better understand application logic. During a debugging session, comon will record...
  2. itsMe

    COM-Hunter - COM Hijacking VOODOO

    COM Hijacking VOODOO COM-hunter is a COM Hijacking persistnce tool written in C#. This tool was inspired during the RTO course of @zeropointsecltd Features     Finds out entry valid CLSIDs in the victim's machine.     Finds out valid CLSIDs via Task Scheduler in the victim's machine.    ...
  3. 1

    Exploits VirtualBox COM RPC Interface Code Injection / Privilege Escalation

    The hardened VirtualBox process on a Windows host does not secure its COM interface leading to arbitrary code injection and elevation of privilege. View the full article
  4. 1

    Exploits VMware Host VMX Process COM Class Hijack Privilege Escalation

    The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created...
  5. 1

    Exploits Microsoft Windows COM Desktop Broker Privilege Escalation

    Microsoft Windows suffers from a COM Desktop Broker privilege escalation vulnerability. View the full article
Back
Top