Malwareman007 / CVE-2023-21768
Windows_AFD_LPE_CVE-2023-21768
☆42Updated last year
Alternatives and similar repositories for CVE-2023-21768:
Users that are interested in CVE-2023-21768 are comparing it to the libraries listed below
- ☆45Updated 9 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆50Updated last year
- CVE-2023-21707 EXP☆28Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- A Cobalt Strike memory evasion loader for redteamers☆95Updated last year
- Winsocket for Cobalt Strike.☆99Updated last year
- Evasive loader to bypass static detection☆56Updated last year
- ☆39Updated last year
- A simple Sleepmask BOF example☆81Updated 4 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆71Updated 10 months ago
- ☆55Updated 6 months ago
- ☆27Updated last year
- VM Escape for Parallels Desktop <18.1.1☆38Updated last year
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆51Updated 10 months ago
- Self Cleanup in post-ex job☆48Updated 4 months ago
- TeamServer and Client of Exploration Command and Control Framework☆82Updated this week
- use aswArPot.sys to kill process☆67Updated 2 years ago
- Shellcode Reductio Entropy Tools☆64Updated last year
- Beacon compiled using clang☆62Updated last year
- Load shellcode via syscall☆47Updated 3 years ago
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆28Updated 2 months ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆39Updated 5 months ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆47Updated 11 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆41Updated 8 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆80Updated 2 years ago
- PAN-OS auth bypass + RCE☆43Updated 2 months ago
- ☆16Updated last year
- This repository contains a PoC for remote code execution CVE-2022-26809☆14Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆48Updated 6 months ago