Offensive-Panda / NT-AUTHORITY-SYSTEM-CONTEXT-RTCOREView external linksLinks
This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offs…
☆30Aug 5, 2024Updated last year
Alternatives and similar repositories for NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE
Users that are interested in NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE are comparing it to the libraries listed below
Sorting:
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Windows 10/11 unsigned kernel driver load/debugging☆17Feb 17, 2023Updated 2 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- ☆21Jan 8, 2026Updated last month
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆30Aug 24, 2025Updated 5 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 10 months ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- A bootkit to bypass Windows login (WIP)☆10Oct 25, 2023Updated 2 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- ☆246Jul 31, 2024Updated last year
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated last month
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- repository contains the infected version of vsftpd 2.3.4.☆44Aug 3, 2016Updated 9 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆22May 19, 2025Updated 8 months ago
- Find .net assemblies locally☆131Oct 14, 2022Updated 3 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- ☆53Sep 23, 2025Updated 4 months ago
- ☆21Dec 1, 2021Updated 4 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102May 6, 2024Updated last year