N1k0la-T / CVE-2023-36745Links
β164Updated last year
Alternatives and similar repositories for CVE-2023-36745
Users that are interested in CVE-2023-36745 are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434β255Updated 10 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ206Updated last year
- Evasive Golang Loaderβ131Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerabilityβ141Updated 5 months ago
- AV bypass while you sip your Chai!β221Updated last year
- β220Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- Escalate Service Account To LocalSystem via Kerberosβ395Updated last year
- Fileless atexec, no more need for port 445β386Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ150Updated 9 months ago
- β136Updated last year
- Attempt at Obfuscated version of SharpCollectionβ216Updated 3 weeks ago
- β228Updated 7 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β241Updated last year
- β154Updated 11 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.β420Updated last year
- AdaptixFramework Extension Kitβ150Updated 3 weeks ago
- A Tool that aims to evade av with binary paddingβ152Updated 11 months ago
- Havoc C2 profile generatorβ90Updated 8 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.β159Updated last year
- Different methods to get current username without using whoamiβ177Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactionsβ305Updated 7 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashesβ209Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β234Updated 2 years ago
- My implementation of the GIUDA project in C++β184Updated last year
- Cobalt Strike BOF for evasive .NET assembly executionβ257Updated 2 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β98Updated this week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β152Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.β238Updated 2 years ago