m-cetin / CVE-2023-29336
☆16Updated last year
Related projects: ⓘ
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated last year
- ☆39Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- DLL Unhooking☆12Updated 3 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- Hide Port In Windows☆37Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- ☆9Updated 7 months ago
- DiagTrack Eop (From Service Account to SYSTEM)☆20Updated last year
- impersonate trustedinstaller by fiddling with tokens☆16Updated 3 years ago
- ☆15Updated 4 years ago
- A flexible tool that creates a minidump of the LSASS process☆12Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆29Updated 2 years ago
- UAC_wenpon☆48Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆27Updated 2 years ago
- ☆37Updated this week
- Windows Etw LPE☆49Updated 2 years ago
- CobaltStrike Reflective Dll Source☆19Updated 2 years ago
- 自用的shellcode生成框架☆29Updated last year
- ☆10Updated 2 years ago
- x64 version☆30Updated 2 years ago
- ☆38Updated 2 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆28Updated last year
- 从admin冲到TrustedInstaller☆16Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- ☆26Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆49Updated last year