D4m0n / CVE-2025-50168-pwn2own-berlin-2025Links
CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.
☆139Updated 2 months ago
Alternatives and similar repositories for CVE-2025-50168-pwn2own-berlin-2025
Users that are interested in CVE-2025-50168-pwn2own-berlin-2025 are comparing it to the libraries listed below
Sorting:
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Analysis of the vulnerability☆50Updated 2 years ago
- ☆124Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- LPE exploit for CVE-2023-36802☆167Updated 2 years ago
- ☆144Updated 10 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Repo with different exploits & PoCs☆66Updated 8 months ago
- ☆137Updated 2 years ago
- ☆37Updated 3 weeks ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Updated last year
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆151Updated 2 years ago
- Plantronics Desktop Hub LPE☆37Updated last year
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆65Updated 9 months ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆55Updated 7 months ago
- This repo contains PoCs for vulnerable Windows drivers.☆114Updated last month
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 9 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 7 months ago
- Windows Win32 Kernel Subsystem☆35Updated 5 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆77Updated 5 months ago
- ☆41Updated last year