jakabakos / CVE-2023-36884-MS-Office-HTML-RCE
MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit
☆40Updated last year
Alternatives and similar repositories for CVE-2023-36884-MS-Office-HTML-RCE:
Users that are interested in CVE-2023-36884-MS-Office-HTML-RCE are comparing it to the libraries listed below
- ☆39Updated 10 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆24Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆55Updated 9 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- ☆37Updated last year
- ☆36Updated 5 months ago
- Identify and exploit leaked handles for local privilege escalation.☆107Updated last year
- Plantronics Desktop Hub LPE☆36Updated 11 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- Persistence via Shell Extensions☆63Updated last year
- Linux Sleep Obfuscation☆97Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆38Updated 9 months ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- Proof-of-Concept for CVE-2024-21345☆73Updated last year
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated 2 years ago
- ☆40Updated 2 years ago