passtheticket / CVE-2024-38200
CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
☆124Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-38200
- ☆128Updated 9 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆142Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆155Updated 3 weeks ago
- ☆147Updated 4 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆239Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆264Updated 3 months ago
- Evasive Golang Loader☆130Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆197Updated last week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆146Updated 6 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆190Updated 5 months ago
- A Tool that aims to evade av with binary padding☆135Updated 4 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆93Updated 2 weeks ago
- ☆163Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆107Updated last month
- C2 Infrastructure Automation☆86Updated last week
- Nameless C2 - A C2 with all its components written in Rust☆239Updated last month
- Use ESC1 to perform a makeshift DCSync and dump hashes☆198Updated last year
- Abuse leaked token handles.☆130Updated 10 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆199Updated 11 months ago
- Documents Exfiltration project for fun and educational purposes☆144Updated last year
- ☆139Updated 4 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆263Updated this week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆135Updated 2 weeks ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆213Updated last week
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆126Updated last year
- Dump lsass using only NTAPIS running 3 programs to create 3 JSON and 1 ZIP file... and generate the Minidump later!☆350Updated last month