killvxk / CVE-2022-26809
not an exploit or a poc
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-26809
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆59Updated 2 years ago
- Slides from out talk at BH IL 2022☆27Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆74Updated 3 years ago
- MacOS C2 Framework☆82Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 2 months ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Beacon Object Files.☆31Updated 8 months ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆52Updated 2 years ago
- ☆17Updated 2 years ago
- lpe poc for cve-2022-21882☆47Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆79Updated last year
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 2 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆41Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆27Updated 2 years ago
- Some Cyber Security related scripts☆18Updated last year
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 2 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- Windows Common Log File System Driver POC☆94Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆33Updated last year
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 2 years ago