redr0nin / CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
☆23Updated 3 months ago
Alternatives and similar repositories for CVE-2024-38143
Users that are interested in CVE-2024-38143 are comparing it to the libraries listed below
Sorting:
- C# DInvoke Shellcode Runner☆32Updated 3 months ago
- BOF for C2 framework☆41Updated 6 months ago
- Proxy function calls through the thread pool with ease☆27Updated 2 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆22Updated 2 months ago
- ☆18Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 11 months ago
- ☆55Updated 6 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 3 weeks ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- use python on windows with full submodule support without installation☆28Updated 3 months ago
- in-process powershell runner for BRC4☆45Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆27Updated 3 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 9 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 9 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated last month
- ☆34Updated last month
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated 2 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆22Updated 3 months ago
- ☆34Updated 4 months ago
- Validates priv escalation of AD trusts☆39Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆24Updated 2 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆28Updated this week
- A python script that automates a C2 Profile build☆41Updated last month