m-cetin / CVE-2023-29336Links
☆21Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29336
Users that are interested in CVE-2023-29336 are comparing it to the libraries listed below
Sorting:
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 3 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆39Updated 6 months ago
- Windows Defender VDM lua collections☆48Updated 3 years ago
- Beacon compiled using clang☆72Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- ☆15Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- 看起来叫BabyBypass,实际啥都 会记一些☆16Updated 2 years ago
- Hide Port In Windows☆42Updated last year
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Updated 3 years ago
- A packer which adds encrypted shell to protect your PE file☆28Updated last year
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Updated last year
- DiagTrack Eop (From Service Account to SYSTEM)☆24Updated 3 years ago
- Windows Etw LPE☆51Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆60Updated last year
- UAC_wenpon☆49Updated 4 years ago
- 简单安排一下 autochk.sys 这个rootkit☆74Updated 2 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- 一个demo☆23Updated last year
- ☆43Updated 2 years ago
- ☆21Updated 5 years ago
- 域前置版本FRP☆16Updated 3 years ago
- ☆40Updated 4 years ago
- ☆92Updated 4 years ago