m417z / CVE-2023-36003-POC
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
☆92Updated last year
Alternatives and similar repositories for CVE-2023-36003-POC:
Users that are interested in CVE-2023-36003-POC are comparing it to the libraries listed below
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆137Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- Windows Kernel Offensive Toolset☆122Updated 8 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Find DLLs with RWX section☆80Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 10 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆105Updated 4 months ago
- Automated .NET AppDomain hijack payload generation☆124Updated 3 months ago
- Weaponized HellsGate/SigFlip☆199Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆61Updated last week
- Splitting and executing shellcode across multiple pages☆101Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆127Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆198Updated 10 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆156Updated 7 months ago
- ☆123Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- ☆151Updated last year
- ☆36Updated 5 months ago
- RegStrike is a .reg payload generator☆58Updated last year
- random code snippets, useful for getting started☆120Updated 5 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year