WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler
☆142Jul 21, 2025Updated 8 months ago
Alternatives and similar repositories for WPTaskScheduler_CVE-2024-49039
Users that are interested in WPTaskScheduler_CVE-2024-49039 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jan 15, 2025Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year
- ☆411Dec 8, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆158Dec 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆59Nov 18, 2024Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆251Sep 8, 2024Updated last year
- ☆288Jul 31, 2024Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- TypeLib persistence technique☆142Oct 22, 2024Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆161Oct 27, 2024Updated last year
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- CVE-2024-30090 - LPE PoC☆107Oct 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- COM ViewLogger — new malware keylogging technique☆407Jan 6, 2025Updated last year
- ☆42Mar 12, 2025Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆427Sep 29, 2025Updated 6 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆466Sep 24, 2023Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆463Aug 2, 2024Updated last year
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- CPP AV/EDR Killer☆480Nov 28, 2023Updated 2 years ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆359Mar 17, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AV/EDR killer using BYOVD technique☆44Sep 27, 2024Updated last year
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆685Aug 15, 2025Updated 8 months ago
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆307Updated this week
- ☆125Mar 23, 2025Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆515Jan 2, 2025Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆198Mar 19, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆129Jan 23, 2025Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆362Aug 11, 2024Updated last year
- Exploit for CVE-2024-29847☆18Sep 15, 2024Updated last year
- ☆194Jul 29, 2024Updated last year
- Reverse engineering winapi function loadlibrary.☆239Apr 17, 2023Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆51Jan 12, 2025Updated last year