Dor00tkit / CVE-2024-30090Links
CVE-2024-30090 - LPE PoC
☆107Updated 9 months ago
Alternatives and similar repositories for CVE-2024-30090
Users that are interested in CVE-2024-30090 are comparing it to the libraries listed below
Sorting:
- ☆121Updated 11 months ago
- ☆81Updated last year
- ☆36Updated 8 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- Analysis of the vulnerability☆51Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 7 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year
- ☆59Updated last year
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 6 months ago
- ☆28Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- Select any exported function in a dll as the new dll's entry point.☆81Updated 9 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆57Updated 3 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 2 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 9 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆72Updated 10 months ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- ☆78Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆75Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 9 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated 11 months ago
- ☆49Updated 4 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- ☆67Updated last year