0vercl0k / CVE-2021-32537View external linksLinks
PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.
☆57Jun 26, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-32537
Users that are interested in CVE-2021-32537 are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Jun 1, 2021Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- ☆24Mar 30, 2021Updated 4 years ago
- ☆11Oct 16, 2021Updated 4 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Aug 2, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- CVE-2020-15368, aka "How to exploit a vulnerable driver"☆505Apr 14, 2022Updated 3 years ago
- ☆49Jun 30, 2020Updated 5 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- cs4.0 cs 4.1 beacon加解密☆25Mar 29, 2021Updated 4 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆73Oct 28, 2019Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Jun 19, 2019Updated 6 years ago
- ☆23Nov 5, 2021Updated 4 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆235Apr 15, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Win32 API Hook偵測☆10Oct 1, 2017Updated 8 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- Exploit for CVE-2021-40449☆54Nov 7, 2021Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Sep 1, 2018Updated 7 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- IDA script for vmprotect Windows Api address decoder☆54Jun 8, 2021Updated 4 years ago
- Super IOCTL Basic Fuzzer☆15Sep 22, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- ☆163Sep 18, 2021Updated 4 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago