BronzeBee / cve-2023-23397Links
Python script for sending e-mails with CVE-2023-23397 payload using SMTP
☆14Updated 2 years ago
Alternatives and similar repositories for cve-2023-23397
Users that are interested in cve-2023-23397 are comparing it to the libraries listed below
Sorting:
- Template-based generation of shellcode loaders☆78Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 2 months ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆89Updated 2 years ago
- ☆119Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆83Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 4 months ago
- Do some DLL SideLoading magic☆86Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆109Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- Find .net assemblies locally☆120Updated 2 years ago
- Find DLLs with RWX section☆81Updated 2 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆81Updated 8 months ago
- ☆112Updated 8 months ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated 2 years ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆119Updated 5 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- ☆79Updated last year
- Your syscall factory☆124Updated last month
- ☆74Updated 2 years ago
- ☆136Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆120Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆123Updated 11 months ago
- ☆76Updated last year
- C# havoc implant☆101Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆145Updated 2 years ago