Nero22k / cve-2023-36802Links
Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver
☆112Updated last year
Alternatives and similar repositories for cve-2023-36802
Users that are interested in cve-2023-36802 are comparing it to the libraries listed below
Sorting:
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- ☆59Updated 11 months ago
- Beacon compiled using clang☆71Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- ☆43Updated 2 years ago
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- ☆100Updated last year
- ☆57Updated last year
- Silently Install Chrome Extension For Persistence☆92Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated last year
- ☆92Updated 4 years ago
- An implementation of an indirect system call☆131Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- ☆242Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆59Updated last year
- Windows LPE☆132Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆178Updated 2 months ago
- ☆80Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆61Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆52Updated last year
- Self Cleanup in post-ex job☆58Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆57Updated 2 weeks ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- Simulate per-process disconnection in red team environments☆110Updated 4 months ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆95Updated 2 years ago