Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-21768

Description

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html

Github

- https://github.com/0xMarcio/cve

- https://github.com/0xsyr0/OSCP

- https://github.com/2lambda123/diaphora

- https://github.com/3yujw7njai/CVE-2023-21768-POC

- https://github.com/5m4r7m4x/downdateWIN

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AiK1d/CVE-2023-21768-POC

- https://github.com/Andromeda254/cve

- https://github.com/Awrrays/Pentest-Tips

- https://github.com/CHDevSec/RedPhaton

- https://github.com/CKevens/CVE-2023-21768-POC

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Cruxer8Mech/Idk

- https://github.com/Dy-Baby/nullmap

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/GhostTroops/TOP

- https://github.com/Gyarbij/xknow_infosec

- https://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768

- https://github.com/Ha0-Y/CVE-2023-21768

- https://github.com/HasanIftakher/win11-Previlage-escalation

- https://github.com/IlanDudnik/CVE-2023-21768

- https://github.com/Iveco/xknow_infosec

- https://github.com/Jammstheshreklord/ELEVATE-PLIVLAGES

- https://github.com/Jammstheshreklord/W

- https://github.com/Malwareman007/CVE-2023-21768

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Mvis1/https-github.com-Mvis1-windows-downdate

- https://github.com/P4x1s/CVE-2023-21768-POC

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/Rosayxy/Recreate-cve-2023-21768

- https://github.com/SafeBreach-Labs/WindowsDowndate

- https://github.com/SamuelTulach/nullmap

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SirElmard/ethical_hacking

- https://github.com/TayoG/44con2023-resources

- https://github.com/Threekiii/CVE

- https://github.com/VishuGahlyan/OSCP

- https://github.com/aneasystone/github-trending

- https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768

- https://github.com/cl4ym0re/cve-2023-21768-compiled

- https://github.com/clearbluejar/44con2023-resources

- https://github.com/clearbluejar/ghidriff

- https://github.com/clearbluejar/recon2023-resources

- https://github.com/exfilt/CheatSheet

- https://github.com/fazilbaig1/oscp

- https://github.com/h1bAna/CVE-2023-21768

- https://github.com/hktalent/TOP

- https://github.com/jitmondal1/OSCP

- https://github.com/joxeankoret/diaphora

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/ldrx30/CVE-2023-21768

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nu1lptr0/LPE_Windows_Exploitation

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/pawan-shivarkar/List-of-CVE-s-

- https://github.com/pawan-shivarkar/pawan-shivarkar

- https://github.com/prvlab/WindowsDowndate

- https://github.com/radoi-teodor/CVE-2023-21768

- https://github.com/radoi-teodor/CVE-2023-21768-DSE-Bypass

- https://github.com/revanmalang/OSCP

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/timeisflowing/recon2023-resources

- https://github.com/txuswashere/OSCP

- https://github.com/xboxoneresearch/CVE-2023-21768-dotnet

- https://github.com/xhref/OSCP

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit