m417z / CVE-2023-36003-POCLinks
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
☆93Updated last year
Alternatives and similar repositories for CVE-2023-36003-POC
Users that are interested in CVE-2023-36003-POC are comparing it to the libraries listed below
Sorting:
- ☆136Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆75Updated 3 months ago
- ☆144Updated 9 months ago
- ☆36Updated 8 months ago
- ☆67Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Convert your shellcode into an ASCII string☆104Updated last month
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Windows Kernel Offensive Toolset☆125Updated last month
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 7 months ago
- We found a way to DLL sideload with cleanmgr.exe☆88Updated 5 months ago
- This repository implements Threadless Injection in C☆169Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆46Updated 2 months ago
- random code snippets, useful for getting started☆121Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 6 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated 11 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆146Updated 4 months ago
- ☆108Updated 2 years ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆113Updated 7 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆227Updated last year