Plantronics Desktop Hub LPE
☆37May 15, 2024Updated last year
Alternatives and similar repositories for CVE-2024-27460
Users that are interested in CVE-2024-27460 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31May 16, 2024Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- ☆143May 22, 2024Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆215May 9, 2024Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 10 months ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- ☆146Mar 29, 2025Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆137Jan 14, 2024Updated 2 years ago
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- Yet another shellcode loader - but a sneaky one☆26Apr 16, 2025Updated 11 months ago
- ☆18May 6, 2025Updated 10 months ago
- ☆150Mar 22, 2024Updated 2 years ago
- ☆82Apr 9, 2024Updated last year
- ☆64Mar 14, 2024Updated 2 years ago
- BOF内存运行exe☆31Jun 19, 2023Updated 2 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- ☆15Aug 12, 2024Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 9 months ago
- ☆288Jul 31, 2024Updated last year
- Detect BypassUAC using AMSI☆30Feb 18, 2025Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Apr 21, 2025Updated 11 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- a tool used to analyze and monitor in named pipes☆194Oct 27, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 9 months ago