N1k0la-T / CVE-2023-36745Links
β165Updated 2 years ago
Alternatives and similar repositories for CVE-2023-36745
Users that are interested in CVE-2023-36745 are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated 2 years ago
- β219Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- Escalate Service Account To LocalSystem via Kerberosβ399Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ142Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434β259Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ225Updated last year
- AV bypass while you sip your Chai!β223Updated last year
- β157Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β248Updated last year
- yet another AV killer tool using BYOVDβ297Updated last year
- Credential Guard Bypass Via Patching Wdigest Memoryβ334Updated 2 years ago
- Awesome AV/EDR/XDR Bypass Tipsβ283Updated 2 years ago
- A Tool that aims to evade av with binary paddingβ156Updated last year
- Execute shellcode files with rundll32β210Updated last year
- β137Updated last year
- Terminate AV/EDR Processes using kernel driverβ348Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β238Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashesβ209Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerabilityβ234Updated 2 years ago
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ151Updated last year
- β232Updated last year
- β163Updated 2 years ago
- TeamServer and Client of Exploration Command and Control Frameworkβ175Updated last week
- Set of python scripts which perform different ways of command execution via WMI protocol.β163Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing iβ¦β391Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β118Updated 4 months ago
- Evasive Golang Loaderβ138Updated last year
- Different methods to get current username without using whoamiβ182Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ196Updated last year