N1k0la-T / CVE-2023-36745
β162Updated last year
Alternatives and similar repositories for CVE-2023-36745:
Users that are interested in CVE-2023-36745 are comparing it to the libraries listed below
- Leak of any user's NetNTLM hash. Fixed in KB5040434β248Updated 5 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β226Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β159Updated last year
- AV bypass while you sip your Chai!β212Updated 8 months ago
- β214Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β149Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerabilityβ136Updated this week
- Escalate Service Account To LocalSystem via Kerberosβ392Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ113Updated 11 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ253Updated 6 months ago
- Evasive Golang Loaderβ132Updated 5 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection sβ¦β279Updated 8 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ200Updated last year
- Execute shellcode files with rundll32β190Updated 11 months ago
- Kill AV/EDR leveraging BYOVD attackβ333Updated last year
- Terminate AV/EDR Processes using kernel driverβ341Updated last year
- Credential Guard Bypass Via Patching Wdigest Memoryβ315Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.β383Updated 7 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.β163Updated 5 months ago
- Amsi Bypass payload that works on Windwos 11β374Updated last year
- β149Updated 6 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β233Updated 7 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β403Updated last month
- γπγProof of concept on BYOVD attackβ154Updated last month
- Attempt at Obfuscated version of SharpCollectionβ203Updated last week
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ145Updated 3 months ago
- Awesome AV/EDR/XDR Bypass Tipsβ254Updated last year
- β138Updated last year