Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
☆79Sep 29, 2024Updated last year
Alternatives and similar repositories for CVE-2024-6769
Users that are interested in CVE-2024-6769 are comparing it to the libraries listed below
Sorting:
- ☆125Sep 5, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ☆194Jul 29, 2024Updated last year
- ☆16Nov 23, 2021Updated 4 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆189Aug 6, 2025Updated 7 months ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- Process injection alternative☆407Sep 6, 2024Updated last year
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆151Apr 26, 2024Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 6 months ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆169May 17, 2023Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆459Aug 2, 2024Updated last year
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- ☆202May 29, 2024Updated last year
- ☆23Mar 6, 2023Updated 3 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Position-independent Reflective Loader for macOS☆119Feb 19, 2026Updated 2 weeks ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆118Jul 17, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year