R41N3RZUF477 / CVE-2023-41772
☆11Updated last year
Alternatives and similar repositories for CVE-2023-41772:
Users that are interested in CVE-2023-41772 are comparing it to the libraries listed below
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆14Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Our Tips&Tricks☆39Updated this week
- Make an Linux Kernel rootkit visible again.☆46Updated 2 weeks ago
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 3 months ago
- Repo for all my exploits/PoCs☆30Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 11 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- ☆26Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 4 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 10 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- ☆45Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 3 months ago
- Cobalt Strike BOFS☆16Updated last year
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- Situational Awareness script to identify how and where to run implants☆41Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆38Updated 10 months ago
- Tool to aid in dumping LSASS process remotely☆35Updated 5 months ago
- hiding in plain sight: part 2☆44Updated 6 months ago
- ☆51Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- MacroExploit use in excel sheet☆20Updated last year
- ☆34Updated last year
- ☆26Updated last year