RomanRybachek / CVE-2024-20698
Analysis of the vulnerability
☆50Updated last year
Alternatives and similar repositories for CVE-2024-20698:
Users that are interested in CVE-2024-20698 are comparing it to the libraries listed below
- ☆32Updated 11 months ago
- Windows AppLocker Driver (appid.sys) LPE☆52Updated 7 months ago
- Plantronics Desktop Hub LPE☆37Updated 10 months ago
- ☆39Updated 9 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆72Updated 2 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 5 months ago
- Proof-of-Concept for CVE-2024-26218☆50Updated 10 months ago
- Proof-of-Concept for CVE-2024-21345☆72Updated 10 months ago
- LPE of CVE-2024-26230☆22Updated 6 months ago
- CVE-2024-30090 - LPE PoC☆105Updated 5 months ago
- Repo with different exploits & PoCs☆64Updated 6 months ago
- ☆35Updated 3 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆49Updated last month
- Windows KASLR bypass using prefetch side-channel☆78Updated 10 months ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆45Updated last month
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 10 months ago
- ☆79Updated 11 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 8 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated 2 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- ☆24Updated last year
- poc code for CVE-2024-38080☆30Updated 6 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆58Updated 3 months ago
- ☆32Updated last year
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago