Skip to content
This repository has been archived by the owner on Jun 18, 2021. It is now read-only.

S3cur3Th1sSh1t/SharpByeBear

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SharpByeBear

This is a weaponized version for the last Exploit published by SandboxEscaper. The vulnerability was fixed with the Windows July 2019 Patches, there are 2 CVEs, i dont know why or which one is correct: CVE-2019-1129, CVE-2019-1130.

Most of the code comes from rasta-mouse CollectorService repository (https://github.com/rasta-mouse/CollectorService). I just changed the CVE-2019-0841-Code from the original SandboxEscaper C++ Code to C# and added some checks.

The vulnerability is a race condition in the AppXSVC Service, so you need a target with multiple cores for successfull exploitation.

You can use this executable for exploitation over edge as well as cortana. Just choose the favorite application.

SharpByeBear.exe license.rtf 1 Option1: edge Option2: cortana

By targeting edge you have to open edge manually after running the executable to trigger the race condition. For cortana you can just click on the search menu in the lower left.

CREDITS

Legal disclaimer:

Usage of SharpByeBear for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational / pentesting purposes.

Releases

No releases published

Packages

No packages published

Languages