Repo with different exploits & PoCs
☆68May 16, 2025Updated 11 months ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆318Apr 16, 2024Updated 2 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆153Apr 26, 2024Updated 2 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆147Mar 29, 2025Updated last year
- ☆288Jul 31, 2024Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LPE exploit for CVE-2024-0582 (io_uring)☆102Mar 29, 2024Updated 2 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated 2 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated 2 years ago
- Windows Snapshot Fuzzer (SNAFUzz)☆41Dec 17, 2025Updated 4 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆912Mar 25, 2026Updated last month
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆441Jul 8, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆221Dec 24, 2025Updated 4 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆48May 22, 2024Updated last year
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated 2 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆14May 27, 2025Updated 11 months ago
- ☆125Sep 5, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Apr 13, 2023Updated 3 years ago
- ☆34Apr 14, 2025Updated last year
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 8 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- CVE漏洞挖掘 (CVE Vulnerability Hunting), by Tr0e.☆18Jun 21, 2025Updated 10 months ago
- Bypassing UAC with SSPI Datagram Contexts☆466Sep 24, 2023Updated 2 years ago
- ☆87Mar 2, 2025Updated last year