L4ys / CVE-2022-21882Links
☆200Updated 3 years ago
Alternatives and similar repositories for CVE-2022-21882
Users that are interested in CVE-2022-21882 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆471Updated 3 years ago
- ☆124Updated 2 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- LPE exploit for CVE-2023-21768☆424Updated 2 years ago
- Leaked Windows processes handles identification tool☆289Updated 3 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- ☆180Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- An implementation and proof-of-concept of Process Forking.☆227Updated 3 years ago
- Kernel Exploits☆257Updated 4 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆150Updated last year
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆188Updated 4 years ago
- ☆140Updated 5 months ago
- LPE exploit for CVE-2023-36802☆162Updated last year
- Move CS beacon to GPU memory when sleeping☆246Updated 3 years ago
- ☆266Updated 2 years ago
- Learnings about windows Internals☆94Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆274Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆163Updated 2 years ago
- ☆173Updated 2 years ago
- ☆215Updated last year
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- ☆133Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- LPE exploit for CVE-2023-21768☆495Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆242Updated 3 years ago
- Bring your own print driver privilege escalation tool☆257Updated 4 years ago
- ☆317Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆118Updated last year