L4ys / CVE-2022-21882View external linksLinks
☆200Feb 4, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2022-21882
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
Sorting:
- win32k LPE☆465Jan 27, 2022Updated 4 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆689Jun 28, 2022Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆797Feb 9, 2022Updated 4 years ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Apr 23, 2021Updated 4 years ago
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Jul 5, 2022Updated 3 years ago
- ☆11Oct 16, 2021Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆900Jan 21, 2025Updated last year
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆177Dec 5, 2022Updated 3 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 3 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- Stop Windows Defender programmatically☆996Nov 4, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆481Nov 11, 2021Updated 4 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- ☆184Dec 16, 2022Updated 3 years ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆204Apr 3, 2022Updated 3 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆81Jul 29, 2022Updated 3 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- ☆41Jul 9, 2020Updated 5 years ago
- ☆41Jun 6, 2021Updated 4 years ago
- PoC MSVC COFF Object file loader/injector.☆185Mar 19, 2021Updated 4 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- CVE-2022-34918 netfilter nf_tables 本地提权 POC☆219Sep 15, 2022Updated 3 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- CVE-2022-0995 exploit☆500Mar 27, 2022Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago