P4x1s / CVE-2023-21768-POCLinks
CVE-2023-21768 Windows 11 22H2 系统本地提权 POC
☆21Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21768-POC
Users that are interested in CVE-2023-21768-POC are comparing it to the libraries listed below
Sorting:
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- ☆102Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Updated 2 years ago
- ☆92Updated 4 years ago
- Shellcode Reductio Entropy Tools☆74Updated 2 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 4 years ago
- cve-2022-39197 poc☆74Updated 3 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 4 years ago
- 域前置版本FRP☆16Updated 3 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 3 years ago
- Bypass Windows Defender☆62Updated 3 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 8 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Updated 3 years ago
- 内存分析中玩贪吃蛇☆16Updated last year
- ☆47Updated last year
- RPC 调用添加ssp扩展dump lsass☆23Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Windows权限控制与其存在的安全问题☆59Updated 5 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- ☆11Updated last month
- 内存加载执行golang elf二进制文件☆29Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year
- 一个基于DNS隧道的简单C2☆61Updated 3 years ago
- 利用EFSRPC协议批量探测出网☆67Updated 2 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Updated 2 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Updated 4 years ago
- portreuse reuseport 端口复用☆61Updated 2 years ago