BitsByWill / ksmbd-n-dayLinks
Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130
☆53Updated 3 months ago
Alternatives and similar repositories for ksmbd-n-day
Users that are interested in ksmbd-n-day are comparing it to the libraries listed below
Sorting:
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Updated 3 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- A collection of various exploits☆28Updated last year
- ☆52Updated 9 months ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆38Updated 5 months ago
- Analysis of the vulnerability☆50Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 6 months ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 8 months ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Updated last year
- A simple Meterpreter stager written in Rust.☆43Updated last month
- ☆80Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆37Updated 2 years ago
- ☆22Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- ☆37Updated last year
- ☆14Updated last year
- ☆27Updated last year
- Attacking the cleanup_module function of a kernel module☆55Updated 6 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- LPE of CVE-2024-26230☆23Updated last year
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆88Updated last week
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- ☆63Updated last year
- Universal root exploit for the linux kernel☆37Updated last year
- javascript extension of windbg for hacker.☆17Updated 2 years ago
- Extract data of TTD trace file to a minidump☆31Updated 2 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Updated 3 years ago