aslitsecurity / CVE-2021-40444_buildersLinks
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
☆169Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40444_builders
Users that are interested in CVE-2021-40444_builders are comparing it to the libraries listed below
Sorting:
- ☆344Updated 3 years ago
- Modified code so that we don´t need to rely on CAB archives☆102Updated 3 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆329Updated 3 years ago
- Automatic ProxyShell Exploit☆115Updated 3 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆333Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Updated 4 years ago
- Windows NTLM Authentication Backdoor☆240Updated 7 months ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆296Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆249Updated 4 years ago
- Use to build an anonymous SMB file server.☆231Updated 4 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- ☆170Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆282Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆203Updated 3 years ago
- PoC for UUID shellcode execution using DInvoke☆156Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆130Updated 5 years ago
- Extendable payload obfuscation and delivery framework☆146Updated 2 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆158Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆265Updated 4 years ago
- POC for CVE-2022-1388☆232Updated 3 years ago
- A C# implementation of RDPThief to steal credentials from RDP.☆163Updated 5 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆185Updated 3 weeks ago
- C# C2 Framework centered around Stage 1 operations☆212Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆309Updated 3 years ago
- Executes position independent shellcode from an encrypted zip☆305Updated 4 years ago
- Stop Windows Defender using the Win32 API☆194Updated 3 years ago