MrAle98 / CVE-2024-49138-POC
POC exploit for CVE-2024-49138
☆237Updated last week
Alternatives and similar repositories for CVE-2024-49138-POC:
Users that are interested in CVE-2024-49138-POC are comparing it to the libraries listed below
- ☆212Updated this week
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆137Updated last month
- ☆138Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago
- ☆343Updated 2 months ago
- ☆149Updated 7 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆369Updated 6 months ago
- Evasive shellcode loader☆343Updated 4 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆251Updated 6 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆296Updated 9 months ago
- Awesome AV/EDR/XDR Bypass Tips☆263Updated last year
- ☆295Updated 2 months ago
- PoC for the Untrusted Pointer Dereference in the ks.sys driver☆275Updated 2 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆508Updated 8 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆383Updated 6 months ago
- Stealthily inject shellcode into an executable☆148Updated 3 weeks ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆435Updated 3 months ago
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆336Updated 7 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆188Updated 3 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆273Updated 8 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆385Updated 7 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆289Updated 10 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆552Updated 7 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last month
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆98Updated 7 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆422Updated 2 weeks ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆84Updated 5 months ago
- ☆246Updated 6 months ago