L4ys / CVE-2022-21882
☆193Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-21882
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆461Updated 2 years ago
- ☆122Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated last year
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆280Updated 2 years ago
- Move CS beacon to GPU memory when sleeping☆236Updated 2 years ago
- ☆506Updated 8 months ago
- An implementation and proof-of-concept of Process Forking.☆218Updated 2 years ago
- Leaked Windows processes handles identification tool☆272Updated 2 years ago
- A little tool to play with the Seclogon service☆303Updated 2 years ago
- ☆172Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆298Updated last year
- A Nim implementation of reflective PE-Loading from memory☆270Updated 2 months ago
- LPE exploit for CVE-2023-36802☆158Updated last year
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆277Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆143Updated last year
- Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs☆287Updated 2 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆346Updated 2 years ago
- Beacon Object File Loader☆273Updated 11 months ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆433Updated last year
- A PoC implementation for dynamically masking call stacks with timers.☆248Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆170Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆175Updated 3 years ago
- LPE exploit for CVE-2023-21768☆416Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆409Updated last year
- PowerShell script to generate "proxy" counterparts to easily perform DLL Sideloading☆113Updated 5 years ago
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago