Nero22k / cve-2023-36802Links
Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver
☆112Updated last year
Alternatives and similar repositories for cve-2023-36802
Users that are interested in cve-2023-36802 are comparing it to the libraries listed below
Sorting:
- ☆59Updated 10 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- Beacon compiled using clang☆71Updated 2 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- An implementation of an indirect system call☆131Updated 2 years ago
- ☆92Updated 4 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- Shellcode Reductio Entropy Tools☆73Updated last year
- Silently Install Chrome Extension For Persistence☆92Updated last year
- lazy way to create CVE-2023-38831 winrar file for testing☆93Updated 2 years ago
- ☆58Updated last year
- Windows LPE☆130Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- ☆42Updated last year
- use aswArPot.sys to kill process☆68Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- ☆244Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆128Updated 2 months ago
- ☆100Updated last year
- ☆136Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆176Updated last month
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆106Updated 2 years ago
- ☆57Updated last year
- Simulate per-process disconnection in red team environments☆110Updated 3 months ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆140Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- ☆80Updated 3 years ago