fortra / CVE-2023-28252
☆178Updated last year
Alternatives and similar repositories for CVE-2023-28252:
Users that are interested in CVE-2023-28252 are comparing it to the libraries listed below
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆148Updated last year
- LPE exploit for CVE-2023-36802☆161Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆185Updated last week
- ☆128Updated last year
- ☆233Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated 11 months ago
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆340Updated 9 months ago
- ☆163Updated last year
- Exploitation of process killer drivers☆199Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆210Updated 7 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆357Updated 4 months ago
- EDRSandblast-GodFault☆261Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆250Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆196Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆304Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆309Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆290Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated 2 months ago
- Native Syscalls Shellcode Injector☆266Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆433Updated last year
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- Windows LPE exploit for CVE-2022-37969☆134Updated last year
- Reflective DLL Injection Made Bella☆226Updated 3 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆216Updated 5 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆283Updated 10 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆119Updated 5 months ago