fortra / CVE-2022-30136Links
Windows Network File System Remote exploit for CVE-2022-30136
☆13Updated 2 years ago
Alternatives and similar repositories for CVE-2022-30136
Users that are interested in CVE-2022-30136 are comparing it to the libraries listed below
Sorting:
- Offensive RPC PoC☆89Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- ☆21Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- Repository for dirty scripts and PoCs☆18Updated 6 months ago
- Small POC for process ghosting☆39Updated 3 years ago
- A simple PE loader.☆26Updated 2 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 3 years ago
- ☆19Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆56Updated 2 years ago
- ADSI based SA tool☆17Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- ☆54Updated 2 years ago
- ☆82Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆33Updated 2 years ago