nu11secur1ty / Windows11ExploitsLinks
☆129Updated this week
Alternatives and similar repositories for Windows11Exploits
Users that are interested in Windows11Exploits are comparing it to the libraries listed below
Sorting:
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated 11 months ago
- Windows And Ways To Break It☆100Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Create and enumerate hidden desktops.☆90Updated last year
- ☆136Updated last year
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago
- ☆160Updated 5 months ago
- ☆161Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated 2 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆116Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆71Updated last month
- random code snippets, useful for getting started☆121Updated 8 months ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 5 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 6 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- A command and control framework.☆52Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year