sqrtZeroKnowledge / CVE-2023-23397_EXPLOIT_0DAY
Exploit for the CVE-2023-23397
☆158Updated last year
Related projects: ⓘ
- Github as C2 Demonstration , free API = free C2 Infrastructure☆128Updated last year
- ☆260Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆222Updated 11 months ago
- ☆125Updated 8 months ago
- Kill AV/EDR leveraging BYOVD attack☆301Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆93Updated 2 months ago
- Evasive Golang Loader☆129Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆219Updated last year
- ☆110Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆259Updated 11 months ago
- ☆138Updated this week
- 「💀」Proof of concept on BYOVD attack☆147Updated 6 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 11 months ago
- Awesome AV/EDR/XDR Bypass Tips☆244Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆144Updated 10 months ago
- Attempt at Obfuscated version of SharpCollection☆188Updated this week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆218Updated last year
- Patching AmsiOpenSession by forcing an error branching☆141Updated last year
- The Official Sliver Armory☆80Updated last month
- Run Your Payload Without Running Your Payload☆174Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆157Updated last year
- A shellcode injection tool showcasing various process injection techniques☆133Updated 9 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆214Updated last month
- PowerShell Reverse Shell☆60Updated last year