exploitblizzard / WindowsMDM-LPE-0DayLinks
CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day
☆50Updated 3 years ago
Alternatives and similar repositories for WindowsMDM-LPE-0Day
Users that are interested in WindowsMDM-LPE-0Day are comparing it to the libraries listed below
Sorting:
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆141Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆111Updated 3 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆139Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- MappingInjection via csharp☆39Updated 3 years ago
- ☆134Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆97Updated 3 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- Windows NTLM Authentication Backdoor☆240Updated 6 months ago
- Exploring in-memory execution of .NET☆139Updated 3 years ago
- Shellcode injection POC using syscalls.☆116Updated 5 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- It stinks☆102Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- UUID based Shellcode loader for your favorite C2☆86Updated 3 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- A rework of CMLuaUtil AutoElevated☆27Updated 2 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year