Zombie-Kaiser / CVE-2024-30088-Windows-poc
该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。
☆32Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-30088-Windows-poc
- 域前置版本FRP☆15Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆66Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆42Updated 8 months ago
- 自用的shellcode生成框架☆29Updated last year
- ☆28Updated last year
- 通杀检测基于白文件patch黑代码的免杀技术的后门☆91Updated 3 months ago
- Silently Install Chrome Extension For Persistence☆42Updated 3 months ago
- ☆27Updated last year
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆52Updated 3 years ago
- Shellcode Reductio Entropy Tools☆62Updated last year
- Call the CLR interface from memory to load powershell, process-less powershell☆12Updated last year
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆30Updated 2 years ago
- ☆38Updated last year
- CVE-2023-21707 EXP☆28Updated last year
- more conveniently Visual-Studio-BOF-template☆53Updated last year
- ☆19Updated 2 years ago
- 将PE文件进行AES加密,然后从远程拉取加载内存中实现免杀☆34Updated last year
- Amazing Obfuscator; 支持混淆 ShellCode 甚至 EXE; Support obfuscating ShellCode, even EXE.☆31Updated this week
- 用于解密并加载shellcode,支持RC4和AES两种解密方法,并使用DInvoke来动态调用WinAPI函数,从而尝试 绕过某些安全解决方案☆29Updated last year
- Rust 重构的 sRDI☆11Updated 2 months ago
- A Python-based VBScript Code Obfuscator☆31Updated 6 months ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- ☆89Updated 3 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆14Updated 4 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆32Updated 6 months ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆88Updated 2 weeks ago
- XOR 加密 分离免杀☆63Updated 10 months ago
- shellcode生成框架☆78Updated 3 months ago
- Binary Hollowing☆53Updated 2 months ago