Cracked5pider / eop24-26229View external linksLinks
A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user
☆40Aug 15, 2024Updated last year
Alternatives and similar repositories for eop24-26229
Users that are interested in eop24-26229 are comparing it to the libraries listed below
Sorting:
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆136Aug 10, 2024Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Aug 19, 2024Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Apr 27, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Aug 5, 2024Updated last year
- Beacon Object File (BOF) Template☆62Feb 6, 2026Updated last week
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆154Jan 21, 2023Updated 3 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Apr 26, 2025Updated 9 months ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- ☆230Jun 10, 2025Updated 8 months ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- ☆158Jul 10, 2024Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Aug 18, 2024Updated last year
- Public repo of some woking evilginx phishlets☆40Nov 4, 2024Updated last year
- Proof-of-Concept for CVE-2024-21345☆76Apr 26, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- ☆125Sep 5, 2024Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆254Jun 6, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year