je5442804 / WPTaskScheduler_CVE-2024-49039
WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler
☆118Updated 4 months ago
Alternatives and similar repositories for WPTaskScheduler_CVE-2024-49039:
Users that are interested in WPTaskScheduler_CVE-2024-49039 are comparing it to the libraries listed below
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆65Updated 5 months ago
- ☆128Updated last year
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆155Updated 6 months ago
- A Tool that aims to evade av with binary padding☆147Updated 8 months ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 8 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆238Updated 9 months ago
- ☆56Updated 4 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- A Beacon Object File (BOF) template for Visual Studio☆177Updated this week
- TypeLib persistence technique☆108Updated 5 months ago
- Bypass LSA protection using the BYODLL technique☆155Updated 6 months ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆169Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆106Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆304Updated 11 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆160Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- ☆237Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆201Updated last year
- Sleep obfuscation☆210Updated 3 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆147Updated last year
- Windows LPE☆119Updated 9 months ago
- Shellcode loader☆77Updated 3 months ago
- Generic PE loader for fast prototyping evasion techniques☆228Updated 8 months ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆129Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year
- ☆129Updated last month
- ☆154Updated last year