KaLendsi / CVE-2020-1054Links
☆20Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1054
Users that are interested in CVE-2020-1054 are comparing it to the libraries listed below
Sorting:
- ☆40Updated 3 years ago
- Windows Etw LPE☆50Updated 4 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- Windows Common Log File System Driver POC☆95Updated 3 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- 参考taviso的代码逆向一下mpengine.dll☆20Updated 3 years ago
- ☆61Updated 2 years ago
- CVE-2021-36955☆14Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Kernel file/process/object tool☆69Updated 4 years ago
- Collection of slides☆33Updated 2 months ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包…☆76Updated 3 years ago
- Vulnerability analysis and proof of concepts☆37Updated 2 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Updated 4 years ago
- defender_database☆23Updated last year
- my exp for CVE-2020-27194, tested on linux kernel 5.8.14.☆15Updated 4 years ago
- May the POC be with you☆63Updated 2 months ago
- ☆26Updated 6 years ago
- ☆12Updated 4 years ago
- ☆11Updated 5 years ago
- ☆33Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago
- Example for PagedOut!☆25Updated 6 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- Exploit for CVE-2021-40449☆51Updated 3 years ago
- LPE of CVE-2024-26230☆24Updated last year
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆32Updated 4 years ago