klsecservices / NauthNRPCLinks
☆11Updated last year
Alternatives and similar repositories for NauthNRPC
Users that are interested in NauthNRPC are comparing it to the libraries listed below
Sorting:
- ☆82Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- ☆73Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Updated 3 years ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆50Updated 11 months ago
- ☆101Updated 3 years ago
- ☆27Updated 3 years ago
- ☆64Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 10 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Repo that holds random POCs☆52Updated 2 years ago
- Plantronics Desktop Hub LPE☆37Updated last year
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆137Updated 2 months ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- some sploits☆19Updated last year
- ☆37Updated last week
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- ☆88Updated 3 years ago
- ☆72Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆76Updated 2 months ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆68Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year