fortra / CVE-2022-30136
Windows Network File System Remote exploit for CVE-2022-30136
☆11Updated last year
Related projects: ⓘ
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- Repository for dirty scripts and PoCs☆16Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- ☆18Updated last year
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆15Updated 4 months ago
- ☆13Updated this week
- ☆20Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆30Updated last year
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- Dangling COM Keys Finder☆14Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- A console obfuscator for .NET assemblies.☆10Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- Example of async client/server sockets in .NET 5☆16Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- Implementation of ITaskHandler in C++☆11Updated last year
- ☆22Updated this week
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆59Updated 2 years ago
- An unfinished DOUBLEPULSAR clone. Set to be redone at a later date☆13Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆23Updated 4 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 6 months ago
- really ?☆12Updated 6 months ago
- One gate to all syscalls!☆23Updated 2 years ago
- ☆29Updated this week
- ☆14Updated last year
- Hacky code for extracting calls in DLLs by function☆14Updated 2 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆18Updated 2 years ago