LPE exploit for CVE-2023-36802
☆25Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for Windows_MSKSSRV_LPE_CVE-2023-36802
Users that are interested in Windows_MSKSSRV_LPE_CVE-2023-36802 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Oct 6, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- POC For CVE-2022-24483☆15Apr 12, 2022Updated 4 years ago
- ☆11Apr 26, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Aug 31, 2022Updated 3 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Winbindex bot to pull in binaries for specific releases☆50Sep 15, 2023Updated 2 years ago
- ☆24May 21, 2021Updated 4 years ago
- Dump Kerberos tickets☆46Aug 4, 2025Updated 9 months ago
- WinDbg installer/updater☆45Jul 11, 2023Updated 2 years ago
- ☆15Mar 13, 2023Updated 3 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated 3 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆57Sep 20, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆256Jul 5, 2022Updated 3 years ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Windows Network File System Crash PoC☆88Jun 17, 2022Updated 3 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Portable & Custmizable Windows Defender☆13Nov 10, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- ☆151Jan 25, 2024Updated 2 years ago
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆69Dec 15, 2025Updated 4 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆54Oct 10, 2023Updated 2 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 3 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- VTable dumper for IDA 7.7+☆19Jun 19, 2025Updated 10 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 5 years ago
- ☆41May 7, 2024Updated 2 years ago