killvxk / CVE-2022-26809
not an exploit or a poc
☆17Updated 3 years ago
Alternatives and similar repositories for CVE-2022-26809:
Users that are interested in CVE-2022-26809 are comparing it to the libraries listed below
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 7 months ago
- MacOS C2 Framework☆83Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆13Updated 2 years ago
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 2 years ago
- Some Cyber Security related scripts☆19Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- works but not work, cao!☆24Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- ☆45Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆81Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated last year
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆52Updated 3 months ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- ☆26Updated 2 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago