L4ys / CVE-2022-21882Links
☆200Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆477Updated 4 years ago
- ☆124Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆307Updated 3 years ago
- ☆178Updated 2 years ago
- Leaked Windows processes handles identification tool☆289Updated 3 years ago
- Windows LPE exploit for CVE-2022-37969☆137Updated 2 years ago
- LPE exploit for CVE-2023-21768☆422Updated 2 years ago
- Kernel Exploits☆260Updated 4 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆360Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆151Updated 2 years ago
- LPE exploit for CVE-2023-36802☆165Updated 2 years ago
- ☆140Updated 7 months ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆190Updated 4 years ago
- An implementation and proof-of-concept of Process Forking.☆230Updated 3 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆277Updated last year
- ☆137Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago
- Learnings about windows Internals☆97Updated 2 years ago
- Move CS beacon to GPU memory when sleeping☆250Updated 4 years ago
- ☆318Updated 2 years ago
- LPE exploit for CVE-2023-21768☆504Updated 2 years ago
- ☆214Updated last year
- Foxit PDF Reader Remote Code Execution Exploit☆120Updated last year
- ☆173Updated 2 years ago
- Exploit for CVE-2022-30206☆75Updated 3 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆301Updated 2 years ago
- ☆269Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- ☆152Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆232Updated 2 years ago