sailay1996 / cve-2022-21882-poc
lpe poc for cve-2022-21882
☆49Updated 3 years ago
Alternatives and similar repositories for cve-2022-21882-poc:
Users that are interested in cve-2022-21882-poc are comparing it to the libraries listed below
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆125Updated 3 years ago
- ☆82Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- my learning case about windows☆21Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆61Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- ☆56Updated 2 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆26Updated 2 years ago
- Simple windows rpc server for research purposes only☆82Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆70Updated 2 years ago
- ☆62Updated 3 years ago
- x64 version☆34Updated 3 years ago
- ☆40Updated 3 years ago
- It stinks☆102Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- HookDetection☆46Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 3 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆54Updated 2 years ago
- Research project for understanding how Mimikatz work and become better at C☆121Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆137Updated 2 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆180Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago