Wh04m1001 / CVE-2022-3368View external linksLinks
☆29Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-3368
Users that are interested in CVE-2022-3368 are comparing it to the libraries listed below
Sorting:
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆184Dec 16, 2022Updated 3 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated 10 months ago
- ☆12Oct 2, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 10 months ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Brute Force password recovery for exported Windows PFX certificates☆17Jan 21, 2017Updated 9 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆265Oct 20, 2021Updated 4 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 9 months ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Jul 12, 2021Updated 4 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year
- ☆44Aug 8, 2022Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆191Feb 5, 2023Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆18Mar 1, 2021Updated 4 years ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- ☆26Aug 5, 2025Updated 6 months ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- ☆133Oct 14, 2022Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago