L4ys / CVE-2022-21882
☆195Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882:
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆469Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- LPE exploit for CVE-2023-36802☆161Updated last year
- ☆178Updated last year
- ☆124Updated 2 years ago
- Leaked Windows processes handles identification tool☆286Updated 3 years ago
- Move CS beacon to GPU memory when sleeping☆246Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆148Updated last year
- LPE exploit for CVE-2023-21768☆418Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆134Updated last year
- ☆314Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆304Updated last year
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆182Updated 3 years ago
- Beacon Object File Loader☆286Updated last year
- An implementation and proof-of-concept of Process Forking.☆226Updated 3 years ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆441Updated 2 years ago
- ☆133Updated 3 weeks ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago
- A Nim implementation of reflective PE-Loading from memory☆278Updated 7 months ago
- ☆183Updated 2 years ago
- ☆163Updated last year
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆280Updated 2 years ago
- A little tool to play with the Seclogon service☆312Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆240Updated 2 years ago
- Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs☆295Updated 2 years ago
- ☆128Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆364Updated 2 years ago
- ☆525Updated last year
- ☆214Updated last year