m417z / CVE-2023-36003-POC
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
☆92Updated last year
Alternatives and similar repositories for CVE-2023-36003-POC:
Users that are interested in CVE-2023-36003-POC are comparing it to the libraries listed below
- ☆138Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆119Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆82Updated 2 months ago
- Windows Kernel Offensive Toolset☆119Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- Sleep obfuscation☆208Updated 2 months ago
- Automated .NET AppDomain hijack payload generation☆119Updated 2 weeks ago
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆137Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 6 months ago
- ☆139Updated 6 months ago
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- Stealthily inject shellcode into an executable☆148Updated 3 weeks ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- ☆143Updated 2 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆131Updated 8 months ago
- Bypass LSA protection using the BYODLL technique☆154Updated 5 months ago
- random code snippets, useful for getting started☆116Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆85Updated 8 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆119Updated 3 months ago
- Recursive Loader☆101Updated 4 months ago
- Weaponized HellsGate/SigFlip☆198Updated last year