L4ys / CVE-2022-21882Links
☆199Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆471Updated 3 years ago
- ☆124Updated 2 years ago
- ☆180Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- Leaked Windows processes handles identification tool☆288Updated 3 years ago
- LPE exploit for CVE-2023-36802☆162Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆149Updated last year
- LPE exploit for CVE-2023-21768☆423Updated 2 years ago
- ☆139Updated 4 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 4 years ago
- ☆133Updated last year
- Kernel Exploits☆257Updated 4 years ago
- Learnings about windows Internals☆94Updated last year
- Move CS beacon to GPU memory when sleeping☆247Updated 3 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆273Updated last year
- ☆265Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- An implementation and proof-of-concept of Process Forking.☆226Updated 3 years ago
- ☆317Updated 2 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆117Updated last year
- Exploit for CVE-2022-30206☆75Updated 2 years ago
- ☆153Updated 2 years ago
- ☆173Updated 2 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- LPE exploit for CVE-2023-21768☆493Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- ☆215Updated last year