0vercl0k / CVE-2021-28476View external linksLinks
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
☆226Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-28476
Users that are interested in CVE-2021-28476 are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆223Jun 5, 2021Updated 4 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆829Jun 12, 2021Updated 4 years ago
- ☆137Aug 3, 2021Updated 4 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆235Apr 15, 2021Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆440Apr 11, 2025Updated 10 months ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- ☆185Jan 12, 2023Updated 3 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- A kAFL based hypervisor fuzzer which fully supports nested VMs☆143Jul 28, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- ☆272Jul 10, 2023Updated 2 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Feb 15, 2019Updated 7 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- A collection of links related to VMware escape exploits☆1,488Sep 4, 2024Updated last year
- Snapshot-based coverage-guided windows kernel fuzzer☆322Dec 16, 2021Updated 4 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,719Jan 2, 2026Updated last month
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- ☆163Sep 18, 2021Updated 4 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- Internals information about Hyper-V☆732Dec 20, 2025Updated last month
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922May 20, 2024Updated last year
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆854Jun 4, 2020Updated 5 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Jan 23, 2021Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆531Nov 5, 2021Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆200Sep 13, 2019Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆148May 23, 2022Updated 3 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Mar 20, 2022Updated 3 years ago