LeadroyaL / CVE-2024-37051-EXPLinks
CVE-2024-37051 poc and exploit
☆29Updated last year
Alternatives and similar repositories for CVE-2024-37051-EXP
Users that are interested in CVE-2024-37051-EXP are comparing it to the libraries listed below
Sorting:
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Updated 2 years ago
- ☆32Updated last year
- CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation☆62Updated 3 years ago
- PoC Exploit for VM2 Sandbox Escape Vulnerability☆47Updated 2 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated 2 years ago
- ☆38Updated 8 months ago
- ZDI presentations, publications, whitepapers etc☆62Updated last year
- Research analysis☆56Updated 3 weeks ago
- POC for CLFS CVE-2022-24481☆14Updated 2 years ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆48Updated 11 months ago
- CVE-2021-42342 RCE☆42Updated 3 years ago
- linux ebpf backdoor demo☆12Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Updated 10 months ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Updated 2 years ago
- ☆17Updated 4 months ago
- linux kernel internals research details☆45Updated last year
- generate facts from bytecode (source is https://github.com/plast-lab/doop-mirror/tree/master/generators)☆23Updated last year
- ☆86Updated 2 years ago
- 🕳️ Proof of Concept exploits and their descriptions for various products☆25Updated last year
- ☆30Updated 3 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Updated last year
- Poc of CVE-2022-22980☆32Updated 3 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆86Updated last year
- ☆17Updated 3 years ago
- CVE-2024-4367 arbitrary js execution in pdf js☆55Updated last year
- 容器安全漏洞的分析与复现☆158Updated last year
- IDA7.6/IDA7.7 + Python3 下,Go 可执行文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆31Updated last year
- CVE-2022-2602☆87Updated 3 years ago
- ☆43Updated 4 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year