Caztemaz / Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-RceLinks
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
☆10Updated this week
Alternatives and similar repositories for Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Users that are interested in Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce are comparing it to the libraries listed below
Sorting:
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆27Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- 一个普通的BOF用来BypassUAC☆22Updated last year
- ☆41Updated last year
- A nim implementation of sRDI☆19Updated last year
- ☆42Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆18Updated 2 months ago
- shadow tls client☆14Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆50Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- More EFS coerced authentication method with PetitPotam.py☆24Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆28Updated 2 weeks ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- load assembly executable file in memory☆41Updated last year
- ☆46Updated last year
- dump lsass tool☆39Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- ☆24Updated 2 months ago
- Kill Everything AV/EDR☆26Updated 8 months ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- replace the shellcode chatacters so that reduce the entropy☆17Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆34Updated 4 months ago
- ☆27Updated last year
- Silently Install Chrome Extension For Persistence☆90Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago