sailay1996 / cve-2022-21882-pocLinks
lpe poc for cve-2022-21882
☆49Updated 3 years ago
Alternatives and similar repositories for cve-2022-21882-poc
Users that are interested in cve-2022-21882-poc are comparing it to the libraries listed below
Sorting:
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- ☆56Updated 2 years ago
- ☆82Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- ☆62Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆68Updated 3 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆96Updated 3 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆125Updated 3 years ago
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆97Updated 3 years ago
- ☆49Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 3 years ago
- ☆26Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Kernel file/process/object tool☆67Updated 3 years ago
- It stinks☆102Updated 3 years ago
- ☆40Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆77Updated 3 years ago
- ☆50Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆55Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago