Wh04m1001 / CVE-2023-36874
☆234Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2023-36874
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆265Updated 6 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆275Updated 3 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆276Updated last year
- ☆159Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆240Updated 5 months ago
- Credential Guard Bypass Via Patching Wdigest Memory☆309Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆321Updated 10 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆298Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆380Updated last year
- EDRSandblast-GodFault☆240Updated last year
- Weaponized HellsGate/SigFlip☆191Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆426Updated 4 months ago
- Execute shellcode files with rundll32☆181Updated 9 months ago
- Exploitation of process killer drivers☆186Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆168Updated 10 months ago
- ☆156Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆152Updated 2 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆191Updated 3 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆313Updated last year
- Shaco is a linux agent for havoc☆145Updated last year
- A PoC implementation for dynamically masking call stacks with timers.☆248Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆279Updated last year
- ☆243Updated 9 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆376Updated last year
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago
- Beacon Object File Loader☆273Updated 11 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆324Updated 5 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆283Updated last year