quijadajose / CVE-2022-26809-RCE
This repository contains a PoC for remote code execution CVE-2022-26809
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-26809-RCE
- ☆21Updated 11 months ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- UAC-ByPass utils☆11Updated 2 years ago
- Enable RDP and set firewall by Windows API.☆19Updated 2 years ago
- EventViewer Bypass Uac Bof☆17Updated 2 years ago
- Load ssp dll golang implementation☆17Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆16Updated 2 months ago
- BugBountyTips en Español☆24Updated last year
- ☆19Updated 2 years ago
- CobaltStrike Reflective Dll Source☆19Updated 2 years ago
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated last year
- dump lsass tool☆39Updated 2 years ago
- 自己使用的一些脚本和工具☆12Updated last month
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated last year
- Beacon Object Files.☆31Updated 8 months ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated last year
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆24Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 2 years ago
- ☆38Updated last year
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆21Updated 2 years ago
- Loader that loads shellcode from UUID's☆22Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- ☆30Updated last year