KaLendsi / CVE-2022-21882
win32k LPE
☆461Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882:
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆780Updated 2 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆361Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆483Updated 3 years ago
- ☆506Updated 3 years ago
- Framework for Kerberos relaying☆889Updated 2 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆307Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆698Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆746Updated last year
- some gadgets about windows process and ready to use :)☆582Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,279Updated last year
- PIC lsass dumper using cloned handles☆579Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆412Updated 3 years ago
- NTLM relaying for Windows made easy☆553Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆825Updated 2 years ago
- Get file less command execution for lateral movement.☆608Updated 2 years ago
- Various Cobalt Strike BOFs☆604Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆822Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆694Updated 4 months ago
- ☆757Updated 2 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆465Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,056Updated 9 months ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆332Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆362Updated 3 years ago
- A unique technique to execute binaries from a password protected zip☆1,012Updated 2 years ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆397Updated 2 months ago
- ☆194Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆729Updated last year
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆444Updated 4 years ago