MagicPwnrin / CVE-2022-30206
Exploit for CVE-2022-30206
☆75Updated last year
Related projects: ⓘ
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆160Updated last year
- ☆131Updated last year
- ☆128Updated 8 months ago
- lpe poc for cve-2022-21882☆47Updated 2 years ago
- ☆72Updated 10 months ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers☆79Updated 6 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆76Updated 6 months ago
- ☆107Updated this week
- ☆148Updated this week
- ☆75Updated this week
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆108Updated 6 months ago
- Run Your Payload Without Running Your Payload☆174Updated last year
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆112Updated last year
- ☆159Updated last year
- ☆124Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆152Updated last year
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆90Updated last year
- POC tools for exploring SMB over QUIC protocol☆119Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆169Updated 2 years ago
- ☆87Updated 2 years ago
- LPE exploit for CVE-2023-36802☆156Updated 11 months ago
- ☆24Updated last year
- Windows internals and exploitation tricks☆90Updated 3 months ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆145Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆70Updated 4 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆131Updated last year