ynwarcs / CVE-2024-38063
poc for CVE-2024-38063 (RCE in tcpip.sys)
☆620Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-38063
- a signal handler race condition in OpenSSH's server (sshd)☆461Updated 4 months ago
- basic concept for the latest windows wifi driver CVE☆236Updated 3 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆353Updated last week
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆283Updated 7 months ago
- PoC for CVE-2023-4911☆379Updated last year
- ☆298Updated 2 years ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆331Updated 3 months ago
- ☆221Updated last month
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆685Updated 9 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,047Updated 3 weeks ago
- ☆1,788Updated 11 months ago
- LPE exploit for CVE-2023-21768☆482Updated last year
- CVE-2023-38831 winrar exploit generator☆779Updated 11 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆708Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆387Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆215Updated 6 months ago
- A command and control framework written in rust.☆281Updated last month
- LPE exploit for CVE-2023-21768☆416Updated last year
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆418Updated last month
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆492Updated 3 months ago
- CVE-2023-32233: Linux内核中的安全漏洞☆368Updated last year
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆319Updated 4 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,150Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆630Updated 3 months ago
- HVNC for Cobalt Strike☆1,163Updated 11 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆295Updated this week
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆605Updated 3 weeks ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆110Updated 3 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆428Updated 3 months ago