Home

Awesome

<p align="center"> <img src="poc.png"> </p> <p align="center"> <img src="https://img.shields.io/github/workflow/status/kkent030315/ZemanaLPE/MSBuild?style=for-the-badge"> <img src="https://img.shields.io/badge/platform-win--64-00a2ed?style=for-the-badge"> <img src="https://img.shields.io/github/license/kkent030315/ZemanaLPE?style=for-the-badge"> </p>

ZemanaLPE

A proof-of-concept of local privilege escalation by exploiting Zemana AntiMalware/AntiLogger

Read more on: https://www.godeye.club/2021/08/30/001-zemana-lpe-vulnerability-exploit.html

Usage

Make sure to use this on the virtual machine, I do not recommend to try this out on the physical machine.
Also, this software provided without any kind of warranty. See LICENSE

  1. Download and Install Zemana AntiMalware or AntiLogger.
  2. (Optional) Restart your machine.
  3. Run.

License

MIT copyright (c) Kento Oki 2021
See LICENSE