Nero22k / cve-2023-36802Links
Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver
☆112Updated last year
Alternatives and similar repositories for cve-2023-36802
Users that are interested in cve-2023-36802 are comparing it to the libraries listed below
Sorting:
- ☆59Updated 9 months ago
- Beacon compiled using clang☆72Updated 2 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆77Updated last year
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- ☆91Updated 4 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆55Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Windows LPE☆130Updated last year
- ☆42Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- An implementation of an indirect system call☆130Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆127Updated last month
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Shellcode Reductio Entropy Tools☆71Updated last year
- ☆244Updated last year
- ☆57Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆173Updated last month
- ☆99Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- ☆136Updated last year
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆48Updated last year
- ☆57Updated last year
- use aswArPot.sys to kill process☆68Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated 2 years ago
- lazy way to create CVE-2023-38831 winrar file for testing☆92Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆140Updated 3 years ago
- ☆48Updated 2 years ago