m-cetin / CVE-2023-29336Links
☆21Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29336
Users that are interested in CVE-2023-29336 are comparing it to the libraries listed below
Sorting:
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 3 years ago
- 自用的shellcode生成框架☆33Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- Windows Defender VDM lua collections☆48Updated 3 years ago
- Hide Port In Windows☆42Updated last year
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆52Updated 6 months ago
- Beacon compiled using clang☆73Updated 3 years ago
- 域前置版本FRP☆16Updated 3 years ago
- A packer which adds encrypted shell to protect your PE file☆28Updated last year
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆19Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- ☆44Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Updated 3 years ago
- Windows Etw LPE☆51Updated 4 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆24Updated 3 years ago
- An implementation of an indirect system call☆132Updated 2 years ago
- ☆21Updated 5 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆61Updated this week
- ☆15Updated 3 years ago
- vehsyscall:a syscall project that may bypass EDR☆61Updated last year
- ☆19Updated 3 years ago
- ☆92Updated 4 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- UAC_wenpon☆49Updated 4 years ago
- 简单安排一下 autochk.sys 这个rootkit☆73Updated 2 years ago
- Code with Windows Hacker☆12Updated 3 years ago