nu11secur1ty / Windows11ExploitsLinks
☆135Updated 3 weeks ago
Alternatives and similar repositories for Windows11Exploits
Users that are interested in Windows11Exploits are comparing it to the libraries listed below
Sorting:
- Windows And Ways To Break It☆98Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆66Updated 2 years ago
- ☆137Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- random code snippets, useful for getting started☆121Updated 10 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆153Updated last year
- Privileger is a tool to work with Windows Privileges☆137Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated last year
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- ☆108Updated 2 years ago
- ☆84Updated 3 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- ☆163Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- ☆160Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- Windows Privilege Escalation☆69Updated 3 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆199Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆74Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year