Nero22k / cve-2023-36802Links
Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver
☆112Updated 2 years ago
Alternatives and similar repositories for cve-2023-36802
Users that are interested in cve-2023-36802 are comparing it to the libraries listed below
Sorting:
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- ☆59Updated last year
- Beacon compiled using clang☆72Updated 3 years ago
- ☆92Updated 4 years ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- ☆44Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆61Updated last year
- Silently Install Chrome Extension For Persistence☆97Updated last year
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated 2 years ago
- Shellcode Reductio Entropy Tools☆74Updated 2 years ago
- ☆100Updated 2 years ago
- ☆62Updated last year
- ☆21Updated 2 years ago
- An implementation of an indirect system call☆132Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- ☆244Updated 2 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Updated 5 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Windows LPE☆139Updated last year
- ☆28Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆69Updated 3 months ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆48Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 3 years ago
- more conveniently Visual-Studio-BOF-template☆75Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago