0vercl0k / CVE-2022-21974Links
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
☆60Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21974
Users that are interested in CVE-2022-21974 are comparing it to the libraries listed below
Sorting:
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Windows Common Log File System Driver POC☆95Updated 4 years ago
- DPX - the Doge Packer for eXecutables☆30Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated last year
- ☆40Updated 4 years ago
- ☆13Updated 3 years ago
- Beacon Object Files.☆36Updated last year
- ☆28Updated 4 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 3 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆26Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆77Updated 4 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- MacOS C2 Framework☆85Updated 4 years ago
- Exploit for LPE in ZoneAlarm Antivirus/Firewall☆32Updated 3 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆121Updated 2 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated 2 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 4 years ago
- ☆48Updated 3 years ago
- ☆49Updated last month
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- A SigFlip implement in golang☆51Updated 4 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 4 years ago
- ☆61Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Updated 4 years ago
- Slides from out talk at BH IL 2022☆29Updated 3 years ago
- ☆81Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111Updated 2 years ago