Wh04m1001 / CVE-2024-20656
☆137Updated last year
Alternatives and similar repositories for CVE-2024-20656:
Users that are interested in CVE-2024-20656 are comparing it to the libraries listed below
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- Evasive Golang Loader☆129Updated 7 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆192Updated 4 months ago
- ☆152Updated 8 months ago
- Sleep obfuscation☆210Updated 3 months ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆250Updated 7 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- AV bypass while you sip your Chai!☆218Updated 10 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆155Updated 6 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- Stage 0☆154Updated 3 months ago
- TeamServer and Client of Exploration Command and Control Framework☆110Updated this week
- ☆162Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆147Updated last week
- Shaco is a linux agent for havoc☆156Updated last year
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆238Updated 9 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆181Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆195Updated 9 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆348Updated 3 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆118Updated 4 months ago
- Execute shellcode files with rundll32☆193Updated last year
- Extracting NetNTLM without touching lsass.exe☆235Updated last year