tykawaii98 / CVE-2024-21338_PoCLinks
☆41Updated last year
Alternatives and similar repositories for CVE-2024-21338_PoC
Users that are interested in CVE-2024-21338_PoC are comparing it to the libraries listed below
Sorting:
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25Updated last year
- ☆37Updated last month
- Plantronics Desktop Hub LPE☆37Updated last year
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- ☆68Updated 2 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆77Updated 6 months ago
- Analysis of the vulnerability☆50Updated 2 years ago
- ☆137Updated 2 years ago
- ☆82Updated last year
- BYOVD collection☆24Updated last year
- Beacon Debugger☆55Updated last year
- ☆124Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆32Updated this week
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 9 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Updated last year
- Sliver agent rewritten in C++☆49Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Updated last year
- Repo that holds random POCs☆52Updated 2 years ago
- Persistence via Shell Extensions☆64Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆72Updated last year
- Core Submodule of Exploration C2☆23Updated last week
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 11 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆53Updated last year
- ☆57Updated 2 years ago