Jnnshschl / CVE-2023-38146Links
PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/
☆21Updated last year
Alternatives and similar repositories for CVE-2023-38146
Users that are interested in CVE-2023-38146 are comparing it to the libraries listed below
Sorting:
- Use ESC1 to perform a makeshift DCSync and dump hashes☆212Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 7 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆75Updated 11 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆138Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆206Updated last week
- Evasive Golang Loader☆133Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆106Updated 2 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆208Updated last week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- Lateral Movement☆124Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆54Updated 11 months ago
- Attempt at Obfuscated version of SharpCollection☆219Updated this week
- PoCs of RCEs against open source C2 servers☆87Updated 10 months ago
- ☆136Updated last year
- ☆158Updated last year
- My implementation of the GIUDA project in C++☆185Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated 10 months ago
- ☆91Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆191Updated 4 months ago
- ☆230Updated last year
- ☆52Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆122Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆138Updated 2 weeks ago
- ☆68Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆127Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 10 months ago
- Exploit for the CVE-2023-23397☆161Updated 2 years ago