P4x1s / CVE-2023-21768-POCLinks
CVE-2023-21768 Windows 11 22H2 系统本地提权 POC
☆21Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21768-POC
Users that are interested in CVE-2023-21768-POC are comparing it to the libraries listed below
Sorting:
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- 免杀计划任务进行权限维持,过主流 杀软。 A schtask tool bypass anti-virus☆69Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- ☆92Updated 4 years ago
- cve-2022-39197 poc☆73Updated 3 years ago
- ☆102Updated 3 years ago
- RPC 调用添加ssp扩展dump lsass☆20Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 5 months ago
- ☆19Updated 3 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- badusb联 动cobaltrstrike近源攻击☆26Updated 4 years ago
- ☆42Updated 2 years ago
- 域前置版本FRP☆15Updated 2 years ago
- 内存分析中玩贪吃蛇☆16Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Bypass Windows Defender☆61Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 3 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆30Updated 2 years ago
- kill windows log☆45Updated last year
- ☆46Updated 10 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆62Updated last year
- XOR 加密 分离免杀☆67Updated last year
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆34Updated 3 years ago