cl4ym0re / cve-2023-21768-compiled
cve-2023-21768
☆22Updated 2 years ago
Alternatives and similar repositories for cve-2023-21768-compiled:
Users that are interested in cve-2023-21768-compiled are comparing it to the libraries listed below
- A POC to disable TamperProtection and other Defender / MDE components☆209Updated 11 months ago
- .bin file to shellcode convertor☆35Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- ☆67Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆45Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆204Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 7 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆120Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆42Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆61Updated last week
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆66Updated 7 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS☆25Updated last year
- Chrome browser extension-based Command & Control☆132Updated 2 months ago
- Do some DLL SideLoading magic☆84Updated last year
- ☆137Updated last year
- Null-free shellcode for TCP reverse shell on Windows x64☆55Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 10 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆20Updated last year
- Collection of red team techniques.☆48Updated 2 weeks ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆140Updated 3 months ago
- Shellcode loader☆81Updated 5 months ago
- ☆163Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Updated 8 months ago
- ☆133Updated 2 years ago