TraiLeR2 / CVE-2023-36168Links
An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component
☆11Updated 2 years ago
Alternatives and similar repositories for CVE-2023-36168
Users that are interested in CVE-2023-36168 are comparing it to the libraries listed below
Sorting:
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆22Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- ☆27Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- Beacon Object Files used for Cobalt Strike☆18Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆22Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆50Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- ☆11Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆81Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- ☆38Updated 2 years ago
- ☆13Updated last year