☆162Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29343
Users that are interested in CVE-2023-29343 are comparing it to the libraries listed below
Sorting:
- ☆90Jun 18, 2023Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- ☆242May 5, 2024Updated last year
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆231Jun 13, 2023Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆235Sep 26, 2023Updated 2 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- ☆129Dec 4, 2023Updated 2 years ago
- ☆161Mar 27, 2023Updated 2 years ago
- A BOF to determine Windows Defender exclusions.☆253Jun 25, 2023Updated 2 years ago
- ☆347Mar 17, 2023Updated 2 years ago
- ☆706Nov 7, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,301Dec 7, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆400Feb 6, 2023Updated 3 years ago
- ☆239Aug 23, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Bypassing UAC with SSPI Datagram Contexts☆462Sep 24, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- ☆180Jul 10, 2023Updated 2 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆335Feb 3, 2023Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated 2 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- Threadless Process Injection using remote function hooking.☆809Sep 4, 2024Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- ☆137Jan 8, 2024Updated 2 years ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Various ways to execute shellcode☆508Mar 13, 2024Updated last year