Dor00tkit / CVE-2024-30090Links
CVE-2024-30090 - LPE PoC
☆107Updated 10 months ago
Alternatives and similar repositories for CVE-2024-30090
Users that are interested in CVE-2024-30090 are comparing it to the libraries listed below
Sorting:
- ☆37Updated 8 months ago
- ☆121Updated 11 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 8 months ago
- ☆81Updated last year
- Analysis of the vulnerability☆51Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆63Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 7 months ago
- ☆28Updated last year
- Proof-of-Concept for CVE-2024-21345☆75Updated last year
- ☆59Updated last year
- ☆39Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 10 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆59Updated 4 months ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆73Updated 10 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆85Updated last week
- Select any exported function in a dll as the new dll's entry point.☆81Updated 10 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆78Updated 4 months ago
- ☆79Updated last year
- ☆145Updated 9 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Repo with different exploits & PoCs☆64Updated 3 months ago
- ☆49Updated 5 months ago