Wh04m1001 / CVE-2023-36723Links
☆67Updated last year
Alternatives and similar repositories for CVE-2023-36723
Users that are interested in CVE-2023-36723 are comparing it to the libraries listed below
Sorting:
- ☆37Updated 10 months ago
- ☆81Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- ☆40Updated last year
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 6 months ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- Sliver agent rewritten in C++☆48Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆28Updated last month
- ☆136Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 11 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆59Updated 7 months ago
- ☆87Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)