RonF98 / CVE-2024-43451-POCLinks
CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious shortcuts.
☆14Updated 5 months ago
Alternatives and similar repositories for CVE-2024-43451-POC
Users that are interested in CVE-2024-43451-POC are comparing it to the libraries listed below
Sorting:
- some sploits☆17Updated 9 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 9 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Materials for CVE-2024-30052.☆13Updated 9 months ago
- ☆39Updated last year
- Analysis of the vulnerability☆51Updated last year
- ☆18Updated 6 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆52Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆25Updated last month
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆26Updated last month
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- A collection of various exploits☆28Updated 10 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆22Updated 8 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 4 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- ☆24Updated 2 years ago
- ☆12Updated 11 months ago
- ☆31Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- ☆59Updated last year
- ☆36Updated 7 months ago