Zombie-Kaiser / CVE-2024-30088-Windows-pocLinks
该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。
☆38Updated last year
Alternatives and similar repositories for CVE-2024-30088-Windows-poc
Users that are interested in CVE-2024-30088-Windows-poc are comparing it to the libraries listed below
Sorting:
- 自用的shellcode生成框架☆32Updated 2 years ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆138Updated 11 months ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆56Updated last year
- A C implementation for a stealth injection method☆31Updated last month
- Beacon compiled using clang☆71Updated 2 years ago
- 简单版的PE加载器☆12Updated 5 years ago
- 将任何 elf 或命令转换为 shellcode☆22Updated last year
- ☆92Updated 4 years ago
- shellcode生成框架☆87Updated last year
- A packer which adds encrypted shell to protect your PE file☆25Updated 10 months ago
- Remote Download and Memory Execute for shellcode framework☆94Updated 2 years ago
- Self Cleanup in post-ex job☆59Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆69Updated 2 years ago
- ☆21Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆14Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆36Updated 2 months ago
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆35Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- create schtasks bypass AV☆20Updated last year
- ☆21Updated 4 months ago
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴 等☆20Updated 2 years ago
- can convert EXE/DLL into position-independent shellcode☆35Updated 2 weeks ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- ☆69Updated last year
- ☆42Updated 2 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆21Updated 3 years ago
- 使用kcp实现的socks5正向代理☆13Updated last year
- use aswArPot.sys to kill process☆68Updated 3 years ago