Repo with different exploits & PoCs
☆67May 16, 2025Updated 10 months ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆316Apr 16, 2024Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆152Apr 26, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆146Mar 29, 2025Updated 11 months ago
- ☆287Jul 31, 2024Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LPE exploit for CVE-2024-0582 (io_uring)☆101Mar 29, 2024Updated last year
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated last year
- Windows Snapshot Fuzzer (SNAFUzz)☆38Dec 17, 2025Updated 3 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated last year
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆906Updated this week
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆64Feb 8, 2026Updated last month
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆220Dec 24, 2025Updated 3 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆48May 22, 2024Updated last year
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- Collection of different rootkit functionality, each driver representing a different rootkit component☆14May 27, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 6 months ago
- ☆124Sep 5, 2024Updated last year
- ☆13Apr 13, 2023Updated 2 years ago
- ☆34Apr 14, 2025Updated 11 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- CVE漏洞挖掘 (CVE Vulnerability Hunting), by Tr0e.☆18Jun 21, 2025Updated 9 months ago
- Bypassing UAC with SSPI Datagram Contexts☆464Sep 24, 2023Updated 2 years ago