decoder-it / diaghub_exploit
Simplified version of Forshaw's Diaghub Collector Exploit
☆31Updated 5 years ago
Alternatives and similar repositories for diaghub_exploit:
Users that are interested in diaghub_exploit are comparing it to the libraries listed below
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- ☆36Updated 7 years ago
- ☆45Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆17Updated 7 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- ☆28Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆24Updated 8 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- Random source codes☆25Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- sploit☆68Updated 5 years ago