Jnnshschl / CVE-2023-38146View external linksLinks
PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/
☆23May 1, 2024Updated last year
Alternatives and similar repositories for CVE-2023-38146
Users that are interested in CVE-2023-38146 are comparing it to the libraries listed below
Sorting:
- ☆13Nov 24, 2021Updated 4 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆28Jan 22, 2025Updated last year
- ☆24May 17, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Sep 13, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- 海康威视iVMS 综合安防任意文件上传 漏洞使用exp☆24Jun 13, 2023Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- ☆35May 31, 2023Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- ☆45Apr 2, 2022Updated 3 years ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆55Nov 16, 2023Updated 2 years ago
- 每日最新的漏洞及投毒情报☆37Jul 2, 2025Updated 7 months ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- Source code and examples for Antignis☆44Oct 21, 2022Updated 3 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- sqli-labs学习记录☆12Jan 15, 2020Updated 6 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆63Jan 21, 2025Updated last year
- Scan systems and docker images for potential spring4shell vulnerabilities. Will detect in-depth (layered archives jar/zip/tar/war and sca…☆11Apr 2, 2022Updated 3 years ago
- A 1014 Byte ELF64/DOS.COM/GameBoy/Megadrive/PDF/ARJ/PKZIP/7zip Polyglot Binary☆13Sep 8, 2022Updated 3 years ago
- ☆10Dec 19, 2024Updated last year
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 9 months ago