0vercl0k / CVE-2022-21974
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
☆59Updated 2 years ago
Alternatives and similar repositories for CVE-2022-21974:
Users that are interested in CVE-2022-21974 are comparing it to the libraries listed below
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- ☆80Updated 3 years ago
- Windows Common Log File System Driver POC☆94Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 5 months ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- ☆72Updated last year
- Simple windows rpc server for research purposes only☆82Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆79Updated 2 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- ☆40Updated 3 years ago
- VM Escape for Parallels Desktop <18.1.1☆38Updated last year
- Proof-of-Concept for CVE-2024-21345☆70Updated 9 months ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆80Updated last year
- ☆81Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆68Updated 2 years ago
- A Cobalt Strike memory evasion loader for redteamers☆97Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆34Updated 2 years ago
- Research project for understanding how Mimikatz work and become better at C☆117Updated 3 years ago
- ☆92Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated last year
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 3 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- x64 version☆30Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated last year