alfarom256 / CVE-2022-45451Links
PoC for Acronis Arbitrary File Read - CVE-2022-45451
☆18Updated 2 years ago
Alternatives and similar repositories for CVE-2022-45451
Users that are interested in CVE-2022-45451 are comparing it to the libraries listed below
Sorting:
- ☆21Updated last year
- DLL Unhooking☆12Updated 4 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 3 years ago
- Hide Port In Windows☆38Updated 7 months ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- ☆40Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- ☆9Updated last year
- ☆11Updated 3 years ago
- ☆26Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆34Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Beacon Debugger☆40Updated 7 months ago
- LPE of CVE-2024-26230☆23Updated 9 months ago
- ☆39Updated 11 months ago
- Source files for my posts☆16Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- ☆54Updated 2 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆35Updated 2 years ago