View Code? Open in Web Editor
NEW
Uses the PEB to obtain an apisetmap in order to translate umbrella DLL's such as "api-ms-win-http-time-l1-1-0.dll" to their origin forward DLL e.g. kernelbase.dll
apisetparse's Introduction
Vulnerabilities I have found over the last couple of years
Zscaler - Denial of Service
Zscaler - Hardened Runtime Bypass
Zscaler - "exit password" Bypass
Zscaler - Local Privilege Escalation CVE-2024-23480
Dropbox - TCC Bypass
Dropbox - TCC Bypass
Dropbox - TCC Bypass
Dropbox - TCC Bypass
Dropbox - TCC Bypass
Upwork - TCC Bypass
netSkope - Local Privilege Escalation
Logitech - Local Privilege Escalation
Logitech - Local Privilege Escalation
Front - TCC Bypass
Zscaler - Local Privilege Escalation
Zscaler - Local Privilege Escalation
WithSecure - Local Privilege Escalation CVE-2024-27358
WithSecure - Denial of Service CVE-2024-27358
Amazon AWS - Local Privilege Escalation CVE-2024-30165
apisetparse's People
Contributors
Watchers