mr-r3b00t / CVE-2023-3519Links
☆14Updated 2 years ago
Alternatives and similar repositories for CVE-2023-3519
Users that are interested in CVE-2023-3519 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆132Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Execute shellcode via ASPNET compiler☆56Updated last week
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆99Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- ☆84Updated 3 years ago
- Permanently disable EDRs as local admin☆117Updated this week
- ☆85Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- ☆59Updated 10 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- Convert your shellcode into an ASCII string☆120Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆199Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Updated 6 months ago
- ☆161Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆214Updated last week
- ☆134Updated last week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆115Updated last week
- ☆27Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆66Updated 2 years ago