Wh04m1001 / CVE-2023-36723
☆67Updated last year
Alternatives and similar repositories for CVE-2023-36723
Users that are interested in CVE-2023-36723 are comparing it to the libraries listed below
Sorting:
- ☆36Updated 5 months ago
- ☆79Updated last year
- Create Anti-Copy DRM Malware☆56Updated 8 months ago
- To audit the security of read-only domain controllers☆116Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆64Updated 2 weeks ago
- ☆128Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆72Updated last month
- ☆83Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆153Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- ☆39Updated 10 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- ☆36Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆70Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.