fortra / CVE-2024-6769View external linksLinks
Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
☆79Sep 29, 2024Updated last year
Alternatives and similar repositories for CVE-2024-6769
Users that are interested in CVE-2024-6769 are comparing it to the libraries listed below
Sorting:
- ☆125Sep 5, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- ☆192Jul 29, 2024Updated last year
- ☆16Nov 23, 2021Updated 4 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆76Nov 11, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Aug 6, 2025Updated 6 months ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Process injection alternative☆404Sep 6, 2024Updated last year
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆107Aug 18, 2025Updated 5 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆150Apr 26, 2024Updated last year
- ☆102Sep 5, 2024Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆168May 17, 2023Updated 2 years ago
- Local & remote Windows DLL Proxying☆170Jun 17, 2024Updated last year
- ☆200May 29, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆457Aug 2, 2024Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆15Nov 11, 2024Updated last year
- ApexLdr is a DLL Payload Loader written in C☆116Jul 17, 2024Updated last year
- ☆68Oct 10, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 9 months ago
- Proof-of-Concept for CVE-2024-21345☆76Apr 26, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆198Jun 17, 2025Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year