P4x1s / CVE-2023-21768-POCLinks
CVE-2023-21768 Windows 11 22H2 系统本地提权 POC
☆21Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21768-POC
Users that are interested in CVE-2023-21768-POC are comparing it to the libraries listed below
Sorting:
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆72Updated 2 years ago
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- ☆102Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆31Updated 2 years ago
- cve-2022-39197 poc☆73Updated 3 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆61Updated 6 months ago
- RPC 调用添加ssp扩展dump lsass☆20Updated 3 years ago
- 内存分析中玩贪吃蛇☆16Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- 域前置版本FRP☆15Updated 2 years ago
- ☆92Updated 4 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 4 years ago
- ☆43Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- portreuse reuseport 端口复用☆61Updated 2 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆19Updated 2 years ago
- Bypass Windows Defender☆61Updated 3 years ago
- NOPEN Tool 又名“morerats” 莫雷斯特,是方程式工具包里的工具。☆46Updated 3 years ago
- ☆19Updated 3 years ago
- CVE-2022-39197(CobaltStrike XSS <=4.7) POC☆47Updated 3 years ago
- ☆11Updated 3 months ago
- 利用EFSRPC协议批量探测出网☆65Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Updated 2 years ago
- kill windows log☆44Updated last year
- Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders☆195Updated 2 years ago
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆39Updated last year
- ad vulnerability scanner☆73Updated last year
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago