RomanRybachek / CVE-2024-20698Links
Analysis of the vulnerability
☆51Updated last year
Alternatives and similar repositories for CVE-2024-20698
Users that are interested in CVE-2024-20698 are comparing it to the libraries listed below
Sorting:
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 9 months ago
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- Repo with different exploits & PoCs☆64Updated 2 months ago
- Proof-of-Concept for CVE-2024-26218☆52Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- LPE of CVE-2024-26230☆24Updated 11 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆57Updated 3 months ago
- ☆39Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 2 months ago
- ☆121Updated 11 months ago
- ☆37Updated last year
- LPE exploit for CVE-2023-36802☆22Updated last year
- ☆24Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- ☆61Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆34Updated 3 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 8 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ☆49Updated 4 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆26Updated last month
- Windows KASLR bypass using prefetch side-channel☆114Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆25Updated 2 months ago
- ☆36Updated 8 months ago
- A few examples of how to trap virtual memory access on Windows.☆33Updated 7 months ago