PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/
☆25May 1, 2024Updated last year
Alternatives and similar repositories for CVE-2023-38146
Users that are interested in CVE-2023-38146 are comparing it to the libraries listed below
Sorting:
- ☆13Nov 24, 2021Updated 4 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- ☆24May 17, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆204Sep 13, 2023Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- 海康威视iVMS 综合安防任意文件上传 漏洞使用exp☆24Jun 13, 2023Updated 2 years ago
- ☆35May 31, 2023Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- ☆28May 25, 2021Updated 4 years ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- ☆10Mar 2, 2026Updated last week
- 每日最新的漏洞及投毒情报☆37Jul 2, 2025Updated 8 months ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆57Nov 16, 2023Updated 2 years ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- ☆46Apr 2, 2022Updated 3 years ago
- Source code and examples for Antignis☆44Oct 21, 2022Updated 3 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- sqli-labs学习记录☆12Jan 15, 2020Updated 6 years ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- 本来要自己写个脚本存放poc,发现有大佬已经写了个轮子,使用J2ExpSuite,后期添加POC☆12Feb 17, 2023Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- ☆13Feb 25, 2023Updated 3 years ago