This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offs…
☆30Aug 5, 2024Updated last year
Alternatives and similar repositories for NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE
Users that are interested in NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- CVE-2018-19320 LPE Exploit☆10Jun 19, 2023Updated 2 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆23Mar 8, 2026Updated 2 weeks ago
- ☆13Oct 12, 2017Updated 8 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- ☆254Jul 31, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆28Feb 6, 2026Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- A bootkit to bypass Windows login (WIP)☆10Oct 25, 2023Updated 2 years ago
- ☆29Aug 24, 2025Updated 7 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- load unsigned kernel-driver by patching dse in 248 lines☆147Mar 22, 2024Updated 2 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated last month
- Just another EDR killer☆133Jan 21, 2026Updated 2 months ago
- So Cool☆13Oct 13, 2020Updated 5 years ago
- ☆21Jan 8, 2026Updated 2 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆10Oct 25, 2017Updated 8 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Find .net assemblies locally☆133Oct 14, 2022Updated 3 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- creates a wav file from multiple bin (redump.org format)☆12Apr 19, 2018Updated 7 years ago