Malwareman007 / CVE-2023-21768Links
Windows_AFD_LPE_CVE-2023-21768
☆52Updated last year
Alternatives and similar repositories for CVE-2023-21768
Users that are interested in CVE-2023-21768 are comparing it to the libraries listed below
Sorting:
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆45Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 8 months ago
- ☆47Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆140Updated 3 years ago
- A simple Sleepmask BOF example☆113Updated 3 weeks ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- CVE-2023-21707 EXP☆28Updated last year
- ☆58Updated 7 months ago
- Remote Access Tool written in C#☆41Updated this week
- A Python-based VBScript Code Obfuscator☆39Updated 2 months ago
- Terminate AV/EDR leveraging BYOVD attack☆87Updated 3 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- Help red teams find opsec processes during engagements☆41Updated 6 months ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆40Updated last month
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆200Updated last week
- Load shellcode via syscall☆54Updated 3 years ago
- ASPX ShellCode Loader☆50Updated last year
- VM Escape for Parallels Desktop <18.1.1☆37Updated 2 years ago
- ☆133Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Silently Install Chrome Extension For Persistence☆88Updated 11 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆47Updated 5 months ago
- ErebusGate for Nim Bypass AV/EDR☆161Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆78Updated 2 years ago