m417z / CVE-2023-36003-POC
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
☆92Updated last year
Alternatives and similar repositories for CVE-2023-36003-POC:
Users that are interested in CVE-2023-36003-POC are comparing it to the libraries listed below
- ☆137Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Windows Kernel Offensive Toolset☆119Updated 6 months ago
- This repository implements Threadless Injection in C☆161Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆94Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆59Updated 8 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- ☆67Updated last year
- Hide your P/Invoke signatures through other people's signed assemblies☆204Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆138Updated 2 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆149Updated last week
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆88Updated 9 months ago
- ☆144Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- Automated .NET AppDomain hijack payload generation☆121Updated last month
- ☆107Updated last year
- ☆35Updated 3 months ago
- ☆150Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 9 months ago
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- Bypass LSA protection using the BYODLL technique☆155Updated 6 months ago
- Reflective DLL Injection Made Bella☆224Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago