Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-7255 PoC — Microsoft Win32k 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Win32k 特权提升漏洞 (CVE-2016-7255)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows的内核模式驱动程序存在特权提升漏洞。攻击者可利用该漏洞在内核模式下执行任意代码。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8.1,Windows Server 2012 Gold和R2,Windows RT 8.1,Windows 10 Gol
Description
An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Readme
# CVE-2016-7255
Proof Of Concept privilege escalation exploit using CVE-2016-7255, aims to mirror the functionality of the exploit found in the wild as described by [Trend Micro](http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/).   

You may want to fix the recovery before using this anywhere important.   

Some code taken from tinysec's original [crash PoC](https://github.com/tinysec/public/tree/master/CVE-2016-7255) and the [ReactOS](https://www.reactos.org/) project.   
File Snapshot

[4.0K] /data/pocs/08fe5f32198c51ec65810cd357060b26199bc535 ├── [4.0K] CVE-2016-7255 │   ├── [ 16K] CVE-2016-7255.cpp │   ├── [ 660] CVE-2016-7255.h │   ├── [8.0K] CVE-2016-7255.vcxproj │   ├── [1.6K] CVE-2016-7255.vcxproj.filters │   ├── [1.7K] ReadMe.txt │   ├── [ 292] stdafx.cpp │   ├── [ 364] stdafx.h │   ├── [ 295] syscall.asm │   ├── [ 306] targetver.h │   └── [1.0K] types.h ├── [1.3K] CVE-2016-7255.sln ├── [1.7K] LICENSE.md └── [ 545] README.md 1 directory, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.