killvxk / CVE-2024-38193-NephsterLinks
☆58Updated last year
Alternatives and similar repositories for CVE-2024-38193-Nephster
Users that are interested in CVE-2024-38193-Nephster are comparing it to the libraries listed below
Sorting:
- Windows LPE☆138Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Updated 5 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- ☆244Updated 2 years ago
- ☆137Updated last year
- WSUS Unauthenticated RCE☆167Updated 2 months ago
- ☆142Updated 9 months ago
- A Tool that aims to evade av with binary padding☆160Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆182Updated 4 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Updated last year
- LPE exploit for CVE-2023-36802☆163Updated 2 years ago
- ☆62Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- Exploit for CVE-2024-29847☆18Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆51Updated 11 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆70Updated 8 months ago
- CobaltStrike beacon in rust☆208Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆88Updated last month
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆178Updated 3 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Updated last year
- Silently Install Chrome Extension For Persistence☆95Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆197Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆63Updated 2 years ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆51Updated 2 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year