N1k0la-T / CVE-2023-36745
β162Updated last year
Alternatives and similar repositories for CVE-2023-36745:
Users that are interested in CVE-2023-36745 are comparing it to the libraries listed below
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- β295Updated this week
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ201Updated last year
- β214Updated last year
- Escalate Service Account To LocalSystem via Kerberosβ393Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434β250Updated 7 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ147Updated 6 months ago
- β137Updated last year
- AV bypass while you sip your Chai!β218Updated 10 months ago
- Different methods to get current username without using whoamiβ174Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- Evasive Golang Loaderβ129Updated 7 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).β443Updated last month
- Attempt at Obfuscated version of SharpCollectionβ205Updated last month
- Use ESC1 to perform a makeshift DCSync and dump hashesβ203Updated last year
- Terminate AV/EDR Processes using kernel driverβ340Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.β396Updated 9 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β231Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ135Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).β287Updated 4 months ago
- Fileless atexec, no more need for port 445β364Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 10 months ago
- γπγProof of concept on BYOVD attackβ155Updated 3 months ago
- Extracting NetNTLM without touching lsass.exeβ235Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β238Updated 9 months ago
- Kill AV/EDR leveraging BYOVD attackβ344Updated last year
- Execute shellcode files with rundll32β193Updated last year
- Awesome AV/EDR/XDR Bypass Tipsβ263Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerabilityβ230Updated last year
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packetsβ79Updated this week