KaLendsi / CVE-2022-21882
win32k LPE
☆460Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882:
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆788Updated 3 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆419Updated 4 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆490Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,313Updated last year
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆457Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆711Updated 8 months ago
- Convert shellcode into different formats!☆352Updated 2 years ago
- some gadgets about windows process and ready to use :)☆585Updated last year
- PIC lsass dumper using cloned handles☆584Updated 2 years ago
- Framework for Kerberos relaying☆910Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆445Updated 4 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆683Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆841Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆456Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- ☆520Updated 3 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 3 years ago
- Various Cobalt Strike BOFs☆636Updated 2 years ago
- ☆196Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆766Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆401Updated last year
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆442Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆851Updated 2 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆470Updated 3 years ago
- Manipulating and Abusing Windows Access Tokens.☆275Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Get file less command execution for lateral movement.☆615Updated 2 years ago
- ☆772Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago