klezVirus / CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
☆794Updated 11 months ago
Related projects: ⓘ
- CVE-2021-40444 PoC☆1,574Updated 2 years ago
- c++ fully undetected shellcode launcher ;)☆962Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,575Updated 10 months ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,327Updated 2 years ago
- The swiss army knife of LSASS dumping☆1,738Updated 2 weeks ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆758Updated 2 years ago
- some gadgets about windows process and ready to use :)☆570Updated 11 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆973Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆811Updated last year
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆884Updated 6 months ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆823Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,393Updated 8 months ago
- win32k LPE☆457Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆626Updated 2 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 2 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆913Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆685Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆960Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,094Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆825Updated 3 years ago
- A tool to kill antimalware protected processes☆1,370Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,241Updated 9 months ago
- Syscall Shellcode Loader (Work in Progress)☆1,106Updated 4 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,513Updated 2 years ago
- Get file less command execution for lateral movement.☆598Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,029Updated last year
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,564Updated 2 weeks ago
- ☆273Updated this week
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆910Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,469Updated 3 years ago