N1k0la-T / CVE-2023-36745
☆163Updated last year
Alternatives and similar repositories for CVE-2023-36745:
Users that are interested in CVE-2023-36745 are comparing it to the libraries listed below
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆114Updated last year
- ☆214Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 10 months ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- AV bypass while you sip your Chai!☆218Updated 9 months ago
- Evasive Golang Loader☆129Updated 7 months ago
- ☆283Updated this week
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆199Updated last year
- Fileless atexec, no more need for port 445☆360Updated 11 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆393Updated 8 months ago
- ☆228Updated 4 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- A Tool that aims to evade av with binary padding☆147Updated 8 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year
- ☆151Updated 8 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆237Updated 9 months ago
- Execute shellcode files with rundll32☆191Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆282Updated 4 months ago
- Awesome AV/EDR/XDR Bypass Tips☆264Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆438Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆404Updated last year
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- TeamServer and Client of Exploration Command and Control Framework☆110Updated this week
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year