duck-sec / CVE-2023-28252-Compiled-exe
A modification to fortra's CVE-2023-28252 exploit, compiled to exe
☆53Updated last year
Alternatives and similar repositories for CVE-2023-28252-Compiled-exe:
Users that are interested in CVE-2023-28252-Compiled-exe are comparing it to the libraries listed below
- Terminate AV/EDR leveraging BYOVD attack☆84Updated last month
- A C# port from Invoke-GhostTask☆114Updated last year
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- Automated .NET AppDomain hijack payload generation☆124Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Abuse leaked token handles.☆132Updated last year
- ☆123Updated last year
- .bin file to shellcode convertor☆34Updated 10 months ago
- ☆87Updated 11 months ago
- C# havoc implant☆99Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- ☆106Updated 2 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆66Updated 10 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆157Updated last month
- Lateral Movement☆123Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆61Updated last week
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- Chrome browser extension-based Command & Control☆132Updated 2 months ago
- Port of Cobalt Strike's Process Inject Kit☆173Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago