CVE-2023-36874_BOF
Windows privilege escalation exploit
An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11
Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE
202 stars
4 watching
28 forks
Language: C++
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service | 62 |
| Represents a proof-of-concept for exploiting a vulnerability to gain privileged access on Windows 10 systems | 79 |
| Tool to bypass Windows security restrictions and gain elevated privileges | 148 |
| Exploits a vulnerability in the polkit system to gain elevated privileges | 1,973 |
| An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| Tools to detect and exploit vulnerabilities in Windows Attack Surface Reduction (ASR) settings | 142 |
| Exploits a vulnerability in SMBv3 compression to achieve privilege escalation and process manipulation. | 68 |
| A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,060 |
| Exploits a kernel vulnerability to gain SYSTEM privileges on Windows. | 29 |
| A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
| A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| An exploit tool for a Windows SMBv3 vulnerability | 1,303 |
| Exploits SeBackupPrivilege to dump remote system hives and credentials. | 159 |
| Exploits and tools for the MS17-010 vulnerability in Windows 7 x64 and Windows Server 2008 R2 | 418 |