jakabakos / CVE-2023-36884-MS-Office-HTML-RCE
MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit
☆39Updated last year
Alternatives and similar repositories for CVE-2023-36884-MS-Office-HTML-RCE:
Users that are interested in CVE-2023-36884-MS-Office-HTML-RCE are comparing it to the libraries listed below
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- ☆54Updated 5 months ago
- ☆35Updated 3 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- Various methods of executing shellcode☆69Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Plantronics Desktop Hub LPE☆37Updated 10 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆53Updated 7 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 9 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- ☆39Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Persistence via Shell Extensions☆64Updated last year
- BYOVD collection☆23Updated last year
- BYOVD Technique Example using viragt64 driver☆34Updated 8 months ago
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- ☆79Updated 11 months ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆68Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 5 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆36Updated 3 weeks ago
- I have documented all of the AMSI patches that I learned till now☆71Updated last year