Wh04m1001 / CVE-2023-36874
☆234Updated last year
Alternatives and similar repositories for CVE-2023-36874:
Users that are interested in CVE-2023-36874 are comparing it to the libraries listed below
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆283Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆289Updated 10 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆302Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆343Updated 2 months ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆371Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆313Updated last year
- ☆161Updated last year
- Native Syscalls Shellcode Injector☆264Updated last year
- EDRSandblast-GodFault☆250Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆318Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆273Updated 8 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆367Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆526Updated last month
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆444Updated 7 months ago
- Exploitation of process killer drivers☆196Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆246Updated 10 months ago
- Shaco is a linux agent for havoc☆156Updated last year
- Evasive Golang Loader☆131Updated 6 months ago
- Weaponized HellsGate/SigFlip☆198Updated last year
- ☆138Updated last year
- Bypass LSA protection using the BYODLL technique☆154Updated 5 months ago
- My implementation of the GIUDA project in C++☆167Updated last year
- COM Hijacking VOODOO☆261Updated this week
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆291Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆383Updated 6 months ago
- ☆242Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- Execute shellcode files with rundll32☆190Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆230Updated last year