zoemurmure / CVE-2023-21768-AFD-for-WinSock-EoP-exploitView external linksLinks
☆16Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21768-AFD-for-WinSock-EoP-exploit
Users that are interested in CVE-2023-21768-AFD-for-WinSock-EoP-exploit are comparing it to the libraries listed below
Sorting:
- ☆11Nov 30, 2020Updated 5 years ago
- VEH debug plugin☆13Apr 28, 2022Updated 3 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Constexpr hash functions for C++☆19May 29, 2020Updated 5 years ago
- G-Presto Anti-Cheat Reverse Engineered.☆26Jun 8, 2022Updated 3 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- A plugin for x64dbg.☆24Apr 25, 2021Updated 4 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Implementation of several code injection techniques.☆24Mar 12, 2022Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆52Aug 22, 2022Updated 3 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Oct 2, 2020Updated 5 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- ☆35May 31, 2023Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆23Oct 3, 2022Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- ☆59Mar 14, 2023Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆27Mar 21, 2023Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆36Feb 5, 2026Updated last week
- code for the Proxy DLL example blog post☆62Oct 29, 2021Updated 4 years ago
- windwos内核研究与驱动Code☆67Dec 25, 2021Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago