L4ys / CVE-2022-21882
☆194Updated 2 years ago
Alternatives and similar repositories for CVE-2022-21882:
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆465Updated 3 years ago
- ☆124Updated 2 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆307Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- ☆174Updated last year
- ☆86Updated 2 years ago
- A little tool to play with the Seclogon service☆309Updated 2 years ago
- ☆126Updated 5 months ago
- Leaked Windows processes handles identification tool☆281Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆282Updated 2 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated 8 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆301Updated last year
- LPE exploit for CVE-2023-36802☆161Updated last year
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆179Updated 3 years ago
- ☆309Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆131Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆429Updated last year
- Move CS beacon to GPU memory when sleeping☆242Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆145Updated last year
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆177Updated 3 years ago
- PIC lsass dumper using cloned handles☆579Updated 2 years ago
- ☆516Updated 11 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆153Updated last year
- LPE exploit for CVE-2023-21768☆418Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆108Updated 2 years ago
- An implementation and proof-of-concept of Process Forking.☆222Updated 3 years ago
- ☆182Updated 2 years ago
- ☆210Updated 10 months ago
- Foxit PDF Reader Remote Code Execution Exploit☆116Updated last year
- A Nim implementation of reflective PE-Loading from memory☆274Updated 4 months ago