cl4ym0re / cve-2023-21768-compiled
cve-2023-21768
☆21Updated last year
Alternatives and similar repositories for cve-2023-21768-compiled:
Users that are interested in cve-2023-21768-compiled are comparing it to the libraries listed below
- A POC to disable TamperProtection and other Defender / MDE components☆195Updated 7 months ago
- .bin file to shellcode convertor☆31Updated 6 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆84Updated 11 months ago
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆41Updated 6 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆77Updated last month
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- Just another C2 Redirector using CloudFlare.☆84Updated 8 months ago
- ☆137Updated last year
- ☆54Updated 2 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆76Updated 3 months ago
- Abuse leaked token handles.☆131Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆29Updated 2 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆106Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆83Updated 5 months ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆56Updated 3 months ago
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- A collection of red team techniques.☆23Updated last month
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆98Updated 3 weeks ago
- ☆122Updated 4 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆80Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆47Updated 6 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆103Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 8 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated 10 months ago