RalfHacker / CVE-2024-26229-exploit
Windows LPE
☆104Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-26229-exploit
- ☆238Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆201Updated last year
- ☆130Updated 10 months ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆179Updated 2 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆227Updated 5 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆151Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆68Updated this week
- ApexLdr is a DLL Payload Loader written in C☆105Updated 4 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated 8 months ago
- ☆44Updated 7 months ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆120Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆110Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆85Updated 8 months ago
- A Beacon Object File (BOF) template for Visual Studio☆140Updated 3 months ago
- Generic PE loader for fast prototyping evasion techniques☆185Updated 4 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆143Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆144Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆164Updated 8 months ago
- ☆68Updated last year
- ☆207Updated 6 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆165Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆310Updated last year
- A Tool that aims to evade av with binary padding☆135Updated 4 months ago
- Bypass Detection By Randomising ROR13 API Hashes☆133Updated 2 years ago
- ☆118Updated 3 months ago