CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day
☆52Feb 21, 2022Updated 4 years ago
Alternatives and similar repositories for WindowsMDM-LPE-0Day
Users that are interested in WindowsMDM-LPE-0Day are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Windows Etw LPE☆52Oct 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆61Jul 11, 2021Updated 4 years ago
- golang uuid-shellcode加载器,分离执行,可直接把shellcode写入程序。☆15Aug 12, 2021Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆79Dec 17, 2021Updated 4 years ago
- Read my blog for more info -☆30Apr 27, 2021Updated 5 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- ☆28Dec 2, 2021Updated 4 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆15Dec 14, 2023Updated 2 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆64Jan 29, 2026Updated 3 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆215Oct 9, 2022Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆29Oct 30, 2021Updated 4 years ago
- Bypass AV 用户添加☆169Dec 30, 2021Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆300Sep 28, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 5 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Aug 19, 2021Updated 4 years ago
- XMLRPC - RCE in MovableTypePoC☆21Mar 21, 2022Updated 4 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Injecting shellcode into a process memory and executing it in C#☆49Oct 2, 2022Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- 影子用户 克隆☆233Dec 30, 2021Updated 4 years ago