cl4ym0re / cve-2023-21768-compiled
cve-2023-21768
☆21Updated 2 years ago
Alternatives and similar repositories for cve-2023-21768-compiled:
Users that are interested in cve-2023-21768-compiled are comparing it to the libraries listed below
- A POC to disable TamperProtection and other Defender / MDE components☆207Updated 9 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆92Updated last year
- .bin file to shellcode convertor☆34Updated 9 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆82Updated 2 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆106Updated 2 months ago
- Create Anti-Copy DRM Malware☆55Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆42Updated 8 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- A malware-analysis tool that identify the exact position and details of malicious content in binary files using external Anti-Virus scann…☆22Updated last year
- ☆107Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ☆39Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- ☆120Updated 7 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- ☆35Updated 4 months ago
- A nice process dumping tool☆80Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 10 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated last year
- ☆115Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆155Updated 6 months ago
- Weaponized HellsGate/SigFlip☆198Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆53Updated 8 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆57Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆100Updated 3 months ago