Nero22k / cve-2023-36802Links
Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver
☆112Updated last year
Alternatives and similar repositories for cve-2023-36802
Users that are interested in cve-2023-36802 are comparing it to the libraries listed below
Sorting:
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆74Updated last year
- ☆58Updated 7 months ago
- Beacon compiled using clang☆69Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Shellcode Reductio Entropy Tools☆70Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- ☆48Updated last year
- ☆91Updated 4 years ago
- Silently Install Chrome Extension For Persistence☆89Updated 11 months ago
- ☆41Updated last year
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Self Cleanup in post-ex job☆56Updated 10 months ago
- An implementation of an indirect system call☆129Updated last year
- ☆96Updated last year
- more conveniently Visual-Studio-BOF-template☆66Updated last year
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆49Updated 5 months ago
- ☆57Updated last year
- Go implementation of the self-deletion of an running executable from disk☆111Updated 2 years ago
- Windows LPE☆127Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 11 months ago
- ☆131Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Help red teams find opsec processes during engagements☆41Updated 7 months ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- ☆240Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago