Zombie-Kaiser / CVE-2024-30088-Windows-pocLinks
该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。
☆40Updated last year
Alternatives and similar repositories for CVE-2024-30088-Windows-poc
Users that are interested in CVE-2024-30088-Windows-poc are comparing it to the libraries listed below
Sorting:
- 自用的shellcode生成框架☆32Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆60Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆140Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆65Updated last month
- A packer which adds encrypted shell to protect your PE file☆25Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- shellcode生成框架☆87Updated last year
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴等☆20Updated 2 years ago
- Beacon compiled using clang☆72Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆37Updated 4 months ago
- An implementation of an indirect system call☆131Updated 2 years ago
- ☆24Updated 6 months ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- ☆20Updated last year
- A C implementation for a stealth injection method☆35Updated 2 weeks ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆37Updated last year
- 简单版的PE加载器☆12Updated 5 years ago
- 将任何 elf 或命令转换为 shellcode☆53Updated last year
- Remote Download and Memory Execute for shellcode framework☆96Updated 3 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆72Updated 3 years ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆41Updated 6 months ago
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- can convert EXE/DLL into position-independent shellcode☆35Updated last month
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- ☆28Updated 2 years ago
- 个人学习使用,二开DcRAT,主要是增加了功能性插件☆17Updated last year
- Self Cleanup in post-ex job☆58Updated last year
- create schtasks bypass AV☆22Updated last year
- ☆43Updated 2 years ago
- ☆69Updated last year