hacksysteam / CVE-2021-45067
Adobe Reader DC Information Leak Exploit
☆21Updated last year
Related projects: ⓘ
- ☆38Updated 2 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆20Updated 2 years ago
- ☆48Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆19Updated 4 months ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- ☆29Updated this week
- Analysis of the vulnerability☆46Updated 7 months ago
- BYOVD collection☆19Updated 5 months ago
- ☆25Updated this week
- Implementation of ITaskHandler in C++☆11Updated last year
- A PoC tool for exploiting leaked process and thread handles☆30Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆30Updated last year
- using the gpu to hide your payload☆47Updated 2 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆35Updated 10 months ago
- Enabled / Disable LSA Protection via BYOVD☆61Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆31Updated last year
- ☆18Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆50Updated this week
- API Hammering with C++20☆34Updated 2 years ago
- Vulnerability analysis and proof of concepts☆30Updated last year
- LPE of CVE-2024-26230☆17Updated 2 weeks ago
- A work in progress BOF/COFF loader in Rust☆38Updated last year
- ☆23Updated 10 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆36Updated last month
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆26Updated last year