Cracked5pider / eop24-26229Links
A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user
☆40Updated 11 months ago
Alternatives and similar repositories for eop24-26229
Users that are interested in eop24-26229 are comparing it to the libraries listed below
Sorting:
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆29Updated 5 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 2 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆47Updated last year
- ☆100Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆62Updated 11 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆48Updated 2 months ago
- ☆23Updated 4 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆51Updated 5 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 4 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 6 months ago
- ☆48Updated last week
- Shellcode Loader Utilizing ETW Events☆63Updated 4 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆35Updated last month
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 10 months ago
- ☆96Updated 10 months ago
- Linker for Beacon Object Files☆121Updated this week
- ☆30Updated 3 months ago
- ☆36Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆54Updated last year
- ☆86Updated 10 months ago
- In-memory hiding technique☆55Updated 6 months ago