Elizarfish / CVE-2023-21823Links
CVE-2023-21823 PoC
☆14Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21823
Users that are interested in CVE-2023-21823 are comparing it to the libraries listed below
Sorting:
- ☆41Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- ☆68Updated 2 years ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆32Updated last month
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆51Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated last year
- A SigFlip implement in golang☆51Updated 4 years ago
- ☆62Updated last year
- ☆137Updated 2 years ago
- A nim implementation of sRDI☆20Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Updated 3 years ago
- Beacon Object Files.☆36Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- ☆43Updated 2 years ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- ☆41Updated 2 years ago
- AV/EDR killer using BYOVD technique☆43Updated last year
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- ☆133Updated 3 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- x64 version☆36Updated 4 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 10 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- ☆37Updated last week