carsonchan12345 / CVE-2024-37726-MSI-Center-Local-Privilege-Escalation
☆34Updated 3 months ago
Alternatives and similar repositories for CVE-2024-37726-MSI-Center-Local-Privilege-Escalation:
Users that are interested in CVE-2024-37726-MSI-Center-Local-Privilege-Escalation are comparing it to the libraries listed below
- ☆79Updated 11 months ago
- ☆38Updated 8 months ago
- Execute dotnet app from unmanaged process☆71Updated 2 months ago
- ☆67Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 4 months ago
- Windows AppLocker Driver (appid.sys) LPE☆51Updated 7 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆57Updated 2 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆44Updated last month
- Tool to bypass LSA Protection (aka Protected Process Light)☆45Updated 2 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆22Updated last month
- Plantronics Desktop Hub LPE☆37Updated 10 months ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Proof-of-Concept for CVE-2024-21345☆71Updated 10 months ago
- CVE-2024-40711-exp☆39Updated 4 months ago
- Create Anti-Copy DRM Malware☆54Updated 6 months ago
- BYOVD collection☆23Updated 11 months ago
- ☆68Updated last year
- ☆94Updated 6 months ago
- CVE-2024-30090 - LPE PoC☆105Updated 4 months ago
- Threadless shellcode injection tool☆63Updated 7 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆86Updated last year
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆37Updated 7 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- Bypassing Amsi using LdrLoadDll☆42Updated 2 months ago