LPE exploit for CVE-2023-36802
☆25Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for Windows_MSKSSRV_LPE_CVE-2023-36802
Users that are interested in Windows_MSKSSRV_LPE_CVE-2023-36802 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Oct 6, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- ☆11Apr 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Aug 31, 2022Updated 3 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Winbindex bot to pull in binaries for specific releases☆49Sep 15, 2023Updated 2 years ago
- ☆24May 21, 2021Updated 4 years ago
- WinDbg installer/updater☆45Jul 11, 2023Updated 2 years ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- ☆15Mar 13, 2023Updated 3 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆65Mar 19, 2024Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆55Sep 20, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated 11 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Windows Network File System Crash PoC☆88Jun 17, 2022Updated 3 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Portable & Custmizable Windows Defender☆13Nov 10, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- ☆150Jan 25, 2024Updated 2 years ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 2 months ago
- VTable dumper for IDA 7.7+☆19Jun 19, 2025Updated 9 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 5 years ago