nu11secur1ty / Windows11ExploitsLinks
☆138Updated this week
Alternatives and similar repositories for Windows11Exploits
Users that are interested in Windows11Exploits are comparing it to the libraries listed below
Sorting:
- Windows And Ways To Break It☆101Updated 2 years ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- ☆138Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆109Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆140Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Create and enumerate hidden desktops.☆88Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- random code snippets, useful for getting started☆121Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆232Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆116Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 4 months ago
- ☆86Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 11 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Windows Privilege Escalation☆69Updated 3 years ago
- Proof of concept & details for CVE-2025-21298☆191Updated 10 months ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago