RonF98 / CVE-2024-43451-POCLinks
CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious shortcuts.
☆15Updated 8 months ago
Alternatives and similar repositories for CVE-2024-43451-POC
Users that are interested in CVE-2024-43451-POC are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 11 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Analysis of the vulnerability☆51Updated last year
- ☆18Updated 9 months ago
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 5 months ago
- ☆59Updated last year
- ☆37Updated 10 months ago
- Universal root exploit for the linux kernel☆35Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- ☆12Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆66Updated last year
- ☆24Updated 2 years ago
- ☆33Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆45Updated 8 months ago
- some sploits☆18Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- ☆40Updated last year
- ☆50Updated 6 months ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Materials for CVE-2024-30052.☆12Updated last year
- CVE-2024-53691☆11Updated 8 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated last year
- Exploit for CVE-2024-4885☆17Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 4 months ago
- Repo with different exploits & PoCs☆64Updated 4 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 5 months ago