SpiralBL0CK / CVE-2024-40431-CVE-2022-25479-EOP-CHAINLinks
CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)
☆45Updated 11 months ago
Alternatives and similar repositories for CVE-2024-40431-CVE-2022-25479-EOP-CHAIN
Users that are interested in CVE-2024-40431-CVE-2022-25479-EOP-CHAIN are comparing it to the libraries listed below
Sorting:
- Analysis of the vulnerability☆51Updated last year
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆66Updated last year
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- Plantronics Desktop Hub LPE☆36Updated last year
- ☆57Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- LPE of CVE-2024-26230☆24Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆50Updated 6 months ago
- ☆32Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆32Updated 2 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 4 months ago
- ☆12Updated 2 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated 2 months ago
- LPE exploit for CVE-2023-36802☆23Updated last year
- ☆59Updated last year
- ☆81Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆20Updated 8 months ago
- A collection of various exploits☆29Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆48Updated 3 weeks ago
- Linux Sleep Obfuscation☆106Updated last year
- A bunch of shenanigans using functions, VEH and more☆35Updated 3 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆24Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 5 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆45Updated 8 months ago