jakabakos / CVE-2023-36884-MS-Office-HTML-RCELinks
MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit
☆40Updated last year
Alternatives and similar repositories for CVE-2023-36884-MS-Office-HTML-RCE
Users that are interested in CVE-2023-36884-MS-Office-HTML-RCE are comparing it to the libraries listed below
Sorting:
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- ☆39Updated 11 months ago
- ☆36Updated 6 months ago
- Plantronics Desktop Hub LPE☆36Updated last year
- ☆67Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Persistence via Shell Extensions☆61Updated last year
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Windows AppLocker Driver (appid.sys) LPE☆59Updated 10 months ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- ☆24Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆35Updated last year
- The AMSI server for Avred☆29Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- ☆40Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- ownCloud exploits for CVE-2023-49105☆37Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 7 months ago
- ☆79Updated last year
- ☆36Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆38Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆21Updated this week