jakabakos / CVE-2023-36884-MS-Office-HTML-RCE
MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit
☆38Updated last year
Alternatives and similar repositories for CVE-2023-36884-MS-Office-HTML-RCE:
Users that are interested in CVE-2023-36884-MS-Office-HTML-RCE are comparing it to the libraries listed below
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- Plantronics Desktop Hub LPE☆37Updated 9 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- Artemis - C++ Hell's Gate Syscall Implementation☆31Updated last year
- ☆39Updated 2 years ago
- API Hammering with C++20☆45Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆76Updated 4 months ago
- Persistence via Shell Extensions☆64Updated last year
- Various methods of executing shellcode☆68Updated last year
- Sliver agent rewritten in C++☆44Updated 5 months ago
- ☆33Updated 2 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆68Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 9 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated 11 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- Analysis of the vulnerability☆49Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆48Updated 6 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- ☆38Updated 7 months ago
- ☆19Updated 8 months ago
- Section-based payload obfuscation technique for x64☆59Updated 6 months ago
- Winsocket for Cobalt Strike.☆97Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Reasonably undetected shellcode stager and executer.☆35Updated 5 months ago