aslitsecurity / CVE-2021-40444_buildersLinks
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
☆169Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40444_builders
Users that are interested in CVE-2021-40444_builders are comparing it to the libraries listed below
Sorting:
- ☆344Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆236Updated 4 years ago
- Windows NTLM Authentication Backdoor☆240Updated 8 months ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆328Updated 3 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆332Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆299Updated 3 years ago
- Modified code so that we don´t need to rely on CAB archives☆101Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Updated 4 years ago
- ☆170Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆267Updated 4 years ago
- Automatic ProxyShell Exploit☆113Updated 4 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆333Updated 3 years ago
- A collection of tools to abuse chrome browser☆296Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- ☆296Updated last year
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆252Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆160Updated 3 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220Updated 2 years ago
- Use to build an anonymous SMB file server.☆231Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆282Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆311Updated 4 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆188Updated 2 months ago
- Executes position independent shellcode from an encrypted zip☆304Updated 4 years ago
- Privilege Escalation Via RpcSs svc☆181Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 4 years ago
- PoC for UUID shellcode execution using DInvoke☆157Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆381Updated 2 years ago