Zombie-Kaiser / CVE-2024-30088-Windows-pocLinks
该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。
☆40Updated last year
Alternatives and similar repositories for CVE-2024-30088-Windows-poc
Users that are interested in CVE-2024-30088-Windows-poc are comparing it to the libraries listed below
Sorting:
- 自用的shellcode生成框架☆32Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆69Updated 3 months ago
- A packer which adds encrypted shell to protect your PE file☆28Updated last year
- ☆24Updated 8 months ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆161Updated last year
- ☆22Updated last year
- A C implementation for a stealth injection method☆38Updated last month
- vehsyscall:a syscall project that may bypass EDR☆61Updated last year
- 简单版的PE加载器☆12Updated 5 years ago
- Remote Download and Memory Execute for shellcode framework☆96Updated 3 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆42Updated 8 months ago
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴等☆21Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- SigFlip与白加黑的完美结合。☆37Updated 8 months ago
- Beacon compiled using clang☆72Updated 3 years ago
- shellcode生成框架☆89Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- Shellcode Reductio Entropy Tools☆74Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆15Updated 2 years ago
- ☆92Updated 4 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆22Updated 3 years ago
- create schtasks bypass AV☆22Updated last year
- ☆10Updated last year
- Self Cleanup in post-ex job☆59Updated last year
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆40Updated last year
- HVNC based on RustDesk☆108Updated last year
- can convert EXE/DLL into position-independent shellcode☆39Updated 4 months ago
- An implementation of an indirect system call☆132Updated 2 years ago