Some CVE resources
☆27Nov 23, 2019Updated 6 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below
Sorting:
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Oct 6, 2017Updated 8 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- adobe afdko fuzz☆41Aug 12, 2019Updated 6 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 3 weeks ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- ☆51Jul 20, 2020Updated 5 years ago
- 绕过火绒剑检测的一个简单的inlinehook方法☆12Mar 10, 2019Updated 6 years ago
- A Generic WOW64 Process Blocker☆14Jul 16, 2021Updated 4 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用 方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包…☆77Dec 31, 2021Updated 4 years ago
- ☆30Jul 18, 2025Updated 7 months ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Dec 4, 2024Updated last year
- ☆39Feb 10, 2021Updated 5 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Research & Study☆17Feb 7, 2026Updated 3 weeks ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago
- A simple demo to autorun beef modules.☆16Aug 19, 2023Updated 2 years ago
- 使用C++控制台实现的加壳器☆83Mar 11, 2019Updated 6 years ago
- C++ code review checklist.☆17Aug 21, 2017Updated 8 years ago