Wh04m1001 / CVE-2023-29343Links
☆163Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29343
Users that are interested in CVE-2023-29343 are comparing it to the libraries listed below
Sorting:
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- ☆184Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆269Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆146Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆170Updated 2 years ago
- Patch AMSI and ETW☆240Updated last year
- A BOF to automate common persistence tasks for red teamers☆279Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆155Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆294Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 7 months ago
- ☆158Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆241Updated 2 years ago
- My implementation of the GIUDA project in C++☆184Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆97Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆238Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆201Updated 3 years ago
- ☆88Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆234Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆163Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆110Updated 11 months ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆149Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆334Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆108Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆135Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆155Updated last year