carsonchan12345 / CVE-2024-37726-MSI-Center-Local-Privilege-EscalationLinks
☆37Updated 8 months ago
Alternatives and similar repositories for CVE-2024-37726-MSI-Center-Local-Privilege-Escalation
Users that are interested in CVE-2024-37726-MSI-Center-Local-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- ☆67Updated last year
- ☆81Updated last year
- ☆121Updated 11 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated 10 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆78Updated 3 months ago
- ☆39Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆85Updated last week
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 7 months ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆29Updated 7 months ago
- Create Anti-Copy DRM Malware☆63Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 8 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 6 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆48Updated 3 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Proof-of-Concept for CVE-2024-21345☆75Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- ☆133Updated last year
- We found a way to DLL sideload with cleanmgr.exe☆92Updated 6 months ago
- Beacon Debugger☆52Updated 9 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago