RomanRybachek / CVE-2024-20698Links
Analysis of the vulnerability
☆50Updated last year
Alternatives and similar repositories for CVE-2024-20698
Users that are interested in CVE-2024-20698 are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Plantronics Desktop Hub LPE☆37Updated last year
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- LPE of CVE-2024-26230☆23Updated last year
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆132Updated last month
- Repo with different exploits & PoCs☆65Updated 7 months ago
- ☆38Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- ☆41Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆63Updated 8 months ago
- ☆122Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated last year
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 11 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 6 months ago
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- ☆37Updated last year
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- ☆61Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- ☆24Updated 2 years ago
- ☆137Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆28Updated 6 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Linux Process Injection via Seccomp Notifier☆78Updated 2 weeks ago
- ☆82Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆24Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Updated 2 months ago