A Tool To Abuse Insecure WSUS Connections For Privilege Escalations
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this blog post: d19K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2Y4L8%4y4W2j5%4g2J5k6g2)9J5k6h3&6W2N6q4)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6t1H3i4K6u0r3x3o6W2Q4x3V1j5H3z5q4)9J5c8Y4N6K6N6i4y4Q4x3X3c8S2N6s2c8S2j5$3E0K6i4K6u0V1M7r3q4J5N6q4)9J5k6o6u0Q4x3X3c8U0N6X3g2Q4x3X3b7J5x3o6t1H3i4K6u0V1x3e0l9I4x3#2)9J5k6r3q4Q4x3X3c8%4K9h3&6V1L8%4N6K6i4K6u0V1x3e0m8Q4x3X3c8D9L8$3y4S2L8q4)9J5k6s2m8J5K9i4k6A6L8r3g2Y4k6g2)9J5k6r3g2K6j5$3q4D9j5i4c8A6L8$3&6Q4x3X3b7I4i4K6u0V1k6r3q4&6i4K6u0r3 It was inspired from the WSuspect proxy project: 526K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6U0N6s2S2A6M7#2)9J5c8Y4N6K6N6i4y4H3k6h3y4@1i4K6u0V1M7s2u0G2P5s2V1`.