0vercl0k / CVE-2022-21971Links
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
☆307Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21971
Users that are interested in CVE-2022-21971 are comparing it to the libraries listed below
Sorting:
- A REAL DoS exploit for CVE-2022-21907☆127Updated 3 years ago
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆475Updated 3 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆364Updated 3 years ago
- ☆200Updated 3 years ago
- Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"☆258Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235Updated 4 years ago
- ☆124Updated 3 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆108Updated 3 years ago
- CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7☆143Updated 3 years ago
- CVE-2022-30190 Follina POC☆104Updated 3 years ago
- POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina☆159Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Updated 3 years ago
- LPE exploit for CVE-2023-21768☆422Updated 2 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆276Updated last year
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆412Updated 11 months ago
- ☆316Updated 2 years ago
- win32k LPE☆467Updated 3 years ago
- ☆411Updated 2 years ago
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆185Updated 4 years ago
- Convert shellcode into different formats!☆356Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆460Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆312Updated 4 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- ☆269Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆381Updated 2 years ago
- PHP binary bugs advisory☆178Updated 3 years ago
- ☆534Updated 3 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆333Updated 4 years ago