klezVirus / CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
☆811Updated last year
Alternatives and similar repositories for CVE-2021-40444
Users that are interested in CVE-2021-40444 are comparing it to the libraries listed below
Sorting:
- CVE-2021-40444 PoC☆1,629Updated 3 years ago
- c++ fully undetected shellcode launcher ;)☆978Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆840Updated 2 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆788Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,367Updated 3 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,078Updated 2 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆904Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,680Updated last year
- Syscall Shellcode Loader (Work in Progress)☆1,191Updated last year
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,001Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆965Updated 2 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,452Updated last year
- A simple python packer to easily bypass Windows Defender☆638Updated 3 years ago
- win32k LPE☆459Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,014Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,389Updated 2 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,020Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆906Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆949Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,061Updated 10 months ago
- some gadgets about windows process and ready to use :)☆586Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆842Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,142Updated 4 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,204Updated last year
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆862Updated 4 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 3 years ago
- Windows AV Evasion☆779Updated 5 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,706Updated 8 months ago