Cracked5pider / eop24-26229Links
A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user
☆41Updated last year
Alternatives and similar repositories for eop24-26229
Users that are interested in eop24-26229 are comparing it to the libraries listed below
Sorting:
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 8 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆161Updated 2 months ago
- ☆100Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 7 months ago
- Beacon Debugger☆55Updated 11 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆126Updated last month
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- ☆50Updated 3 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆74Updated last month
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆97Updated 2 months ago
- Less sugar (entropy) for your binaries☆34Updated last month
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆52Updated 5 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆59Updated 5 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Updated 2 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆59Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆80Updated 5 months ago
- ☆94Updated last year
- remote process injections using pool party techniques☆66Updated 3 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Updated 2 years ago
- ☆32Updated 6 months ago
- ☆98Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- ForsHops☆58Updated 6 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆134Updated 8 months ago