ThemeHackers / CVE-2024-38063Links
CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)
☆27Updated this week
Alternatives and similar repositories for CVE-2024-38063
Users that are interested in CVE-2024-38063 are comparing it to the libraries listed below
Sorting:
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 9 months ago
- PoC for the Untrusted Pointer Dereference in the ks.sys driver☆280Updated 6 months ago
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆344Updated 11 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆92Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- ☆251Updated 10 months ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆198Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- POC exploit for CVE-2024-49138☆249Updated 3 months ago
- Proof of concept & details for CVE-2025-21298☆182Updated 4 months ago
- ☆233Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆193Updated last month
- PoC for CVE-2024-48990☆98Updated 6 months ago
- ☆136Updated last year
- ☆180Updated last year
- Rapidly initialize Windows Sanbox for malware analysis and reverse engineering☆134Updated 3 months ago
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆293Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆132Updated 3 months ago
- Reflective DLL Injection Made Bella☆227Updated 5 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆285Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆222Updated 7 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆301Updated 2 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆95Updated 8 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆130Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆149Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)☆90Updated 11 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆122Updated 10 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆409Updated 10 months ago
- ☆245Updated 4 months ago