KaLendsi / CVE-2020-1054
☆20Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-1054
- Windows Etw LPE☆50Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 2 years ago
- ☆40Updated 2 years ago
- 从admin冲到TrustedInstaller☆17Updated last year
- Kernel file/process/object tool☆64Updated 3 years ago
- CVE-2021-36955☆13Updated last year
- ☆25Updated 5 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆17Updated 2 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 2 years ago
- ☆57Updated last year
- LPE of CVE-2024-26230☆20Updated 2 months ago
- ☆10Updated 3 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆30Updated 4 years ago
- ☆26Updated 2 years ago
- ☆15Updated 2 years ago
- Here is python script I wrote for deobfuscation APT32 sample.☆10Updated 3 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆29Updated 3 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated last year
- my exp for CVE-2020-27194, tested on linux kernel 5.8.14.☆15Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆38Updated 3 years ago
- ☆11Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆20Updated 2 years ago