☆21Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29336
Users that are interested in CVE-2023-29336 are comparing it to the libraries listed below
Sorting:
- Injector with kernel power☆18Jan 2, 2021Updated 5 years ago
- Go实现用于Windows系统的进程隐藏工具,通过DLL注入技术将指定进程从任务管理器中隐藏☆26Jan 22, 2026Updated last month
- ☆34Aug 7, 2023Updated 2 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Mar 16, 2022Updated 3 years ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- (0day)DBSyncer后台自定义插件上传-注入内存马☆16Sep 5, 2024Updated last year
- ☆74Nov 28, 2025Updated 3 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆63Feb 17, 2026Updated 2 weeks ago
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆23Feb 10, 2024Updated 2 years ago
- ☆125Sep 5, 2024Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- ☆47Dec 28, 2025Updated 2 months ago
- ☆59Feb 12, 2026Updated 3 weeks ago
- Scripts for BotOfLegends.com☆20Jan 7, 2015Updated 11 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- ☆61Aug 21, 2023Updated 2 years ago
- ☆25Aug 21, 2022Updated 3 years ago
- ☆26May 31, 2019Updated 6 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 8 months ago
- ☆336Jun 4, 2024Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆26Apr 6, 2025Updated 11 months ago
- ☆137Jan 8, 2024Updated 2 years ago
- Shows different icons for 64 and 32-bit DLLs. Register with RegSvr32 to install☆38Dec 28, 2024Updated last year
- 个人漏洞收集项目,包括复现环境、POC、EXP等☆30Mar 14, 2025Updated 11 months ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- Supershell反制☆32Aug 8, 2023Updated 2 years ago
- Windows LPE☆139Jun 11, 2024Updated last year
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆30Jul 4, 2019Updated 6 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- ☆30Nov 8, 2017Updated 8 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Some winforms examples primarily for educational purposes.☆10Jul 7, 2023Updated 2 years ago
- EDRcoin source☆10Mar 23, 2016Updated 9 years ago