D4m0n / CVE-2025-50168-pwn2own-berlin-2025Links
CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.
☆137Updated 2 months ago
Alternatives and similar repositories for CVE-2025-50168-pwn2own-berlin-2025
Users that are interested in CVE-2025-50168-pwn2own-berlin-2025 are comparing it to the libraries listed below
Sorting:
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Analysis of the vulnerability☆50Updated last year
- ☆122Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- ☆143Updated 9 months ago
- LPE exploit for CVE-2023-36802☆164Updated 2 years ago
- ☆137Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- ☆37Updated last week
- Repo with different exploits & PoCs☆66Updated 7 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆151Updated 2 years ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆64Updated 8 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- Plantronics Desktop Hub LPE☆37Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Updated last year
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆55Updated 6 months ago
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- ☆82Updated last year
- Linux Process Injection via Seccomp Notifier☆79Updated last month
- ☆38Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 11 months ago
- ☆52Updated 9 months ago
- A Reflective Loader for macOS☆144Updated 5 months ago