Analysis of the vulnerability
☆50Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2024-20698
Users that are interested in CVE-2024-20698 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆150Jan 25, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Windows KASLR bypass using prefetch side-channel☆178Apr 26, 2024Updated last year
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- ☆82Apr 9, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆154Oct 12, 2023Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆42Jan 14, 2024Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆64Mar 14, 2024Updated 2 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- ☆137Jan 8, 2024Updated 2 years ago
- (0day)DBSyncer后台自定义插件上传-注入内存马☆16Sep 5, 2024Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Jul 2, 2020Updated 5 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 2 months ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ☆22Oct 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆21Jun 9, 2023Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆37Oct 11, 2023Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆41Apr 2, 2024Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆441Dec 7, 2025Updated 3 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆83Aug 30, 2024Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- idb2pat script and idb2sig plugin☆16Jan 19, 2022Updated 4 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 7 months ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- ☆48Jun 30, 2020Updated 5 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆172Feb 10, 2026Updated last month