DLL Hijacking using DLL Proxying technique
proof-of-concept exploit exported-functions poc vulnerability cve privilege-escalation mingw-w64 local-privilege-escalation dll-hijacking hijacking windows-privilege-escalation elevation-of-privilege dll-proxying pop-a-shell
-
Updated
Feb 1, 2022 - HTML