fortra / CVE-2024-6769Links
Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
☆71Updated 8 months ago
Alternatives and similar repositories for CVE-2024-6769
Users that are interested in CVE-2024-6769 are comparing it to the libraries listed below
Sorting:
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆130Updated 9 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆156Updated 2 months ago
- An example reference design for a proposed BOF PE☆168Updated last month
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆159Updated 2 weeks ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆120Updated 6 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆84Updated 2 years ago
- Bypass LSA protection using the BYODLL technique☆161Updated 8 months ago
- Injecting DLL into LSASS at boot☆113Updated last month
- bring your own vulnerable driver☆96Updated 2 years ago
- TypeLib persistence technique☆115Updated 7 months ago
- find dll base addresses without PEB WALK☆91Updated 3 weeks ago
- Generic PE loader for fast prototyping evasion techniques☆231Updated 11 months ago
- Shellcode loader☆81Updated 6 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 7 months ago
- Exploitation of process killer drivers☆201Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆257Updated 10 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆149Updated last year
- ApexLdr is a DLL Payload Loader written in C☆110Updated 10 months ago
- Exploitation of echo_driver.sys☆170Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆120Updated last month
- ☆85Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆178Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆169Updated 2 years ago
- ☆61Updated last year
- ☆130Updated last year
- ☆122Updated 8 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- ☆125Updated 9 months ago
- ForsHops☆53Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆63Updated last month