An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component
☆11Aug 5, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-36168
Users that are interested in CVE-2023-36168 are comparing it to the libraries listed below
Sorting:
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- ☆14Mar 20, 2025Updated 11 months ago
- Vulnerability analysis and proof of concepts☆38May 15, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- some sploits☆19Sep 20, 2024Updated last year
- ☆19Jan 31, 2023Updated 3 years ago
- ☆39May 20, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- ☆46Oct 27, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ☆55Oct 12, 2024Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago