m417z / CVE-2023-36003-POCLinks
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
☆92Updated last year
Alternatives and similar repositories for CVE-2023-36003-POC
Users that are interested in CVE-2023-36003-POC are comparing it to the libraries listed below
Sorting:
- ☆136Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated 2 months ago
- Convert your shellcode into an ASCII string☆58Updated this week
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 9 months ago
- ☆67Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆110Updated 6 months ago
- Reflective DLL Injection Made Bella☆228Updated 5 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆121Updated 7 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- random code snippets, useful for getting started☆120Updated 7 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- ☆107Updated 2 years ago
- ☆142Updated 7 months ago
- ☆121Updated 9 months ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆71Updated 8 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆7Updated 5 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- ☆234Updated last year
- ☆36Updated 6 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year