tykawaii98 / CVE-2024-21338_PoCLinks
☆39Updated last year
Alternatives and similar repositories for CVE-2024-21338_PoC
Users that are interested in CVE-2024-21338_PoC are comparing it to the libraries listed below
Sorting:
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆23Updated last year
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- ☆37Updated 9 months ago
- ☆67Updated last year
- Analysis of the vulnerability☆51Updated last year
- Beacon Debugger☆54Updated 10 months ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆46Updated this week
- ☆121Updated last year
- ☆81Updated last year
- ☆136Updated last year
- BYOVD collection☆23Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆65Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆27Updated 3 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆29Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆108Updated 10 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆35Updated 4 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆90Updated 3 weeks ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- ☆16Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆106Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 10 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Cyber Security Reseraching and RedTeam Kits Code☆41Updated 2 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆39Updated 2 months ago