m-cetin / CVE-2023-29336
☆19Updated last year
Alternatives and similar repositories for CVE-2023-29336:
Users that are interested in CVE-2023-29336 are comparing it to the libraries listed below
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- Hide Port In Windows☆38Updated 3 months ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- DLL Unhooking☆12Updated 3 years ago
- ☆40Updated 3 years ago
- ☆15Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Windows Etw LPE☆50Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆50Updated last year
- ☆19Updated 2 years ago
- 自用的shellcode生成框架☆30Updated last year
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- ☆38Updated 7 months ago
- ☆57Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- ☆9Updated last year
- ☆16Updated 10 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆34Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 2 years ago
- x64 version☆30Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- dump lsass tool☆39Updated 2 years ago
- Beacon Debugger☆39Updated 3 months ago