CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
☆29Nov 14, 2025Updated 3 months ago
Alternatives and similar repositories for CVE-2025-62215-exploit-poc
Users that are interested in CVE-2025-62215-exploit-poc are comparing it to the libraries listed below
Sorting:
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆56Jun 12, 2025Updated 8 months ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆16Feb 16, 2024Updated 2 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆50Nov 3, 2025Updated 4 months ago
- Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC si…☆30Apr 6, 2025Updated 11 months ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆71Apr 25, 2025Updated 10 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆228Apr 12, 2025Updated 10 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆91Nov 6, 2025Updated 4 months ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69May 5, 2023Updated 2 years ago
- ☆41Mar 12, 2025Updated 11 months ago
- ☆149Jan 25, 2024Updated 2 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆33Jun 30, 2021Updated 4 years ago
- sideloading PoC using onedrive.exe & version.dll☆92Oct 30, 2025Updated 4 months ago
- ☆38Dec 14, 2024Updated last year
- ☆10Aug 26, 2016Updated 9 years ago
- Tutorial of Time Series Forecasting using NeuralProphet☆12Feb 26, 2022Updated 4 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 4 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Updated this week
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆96Jan 5, 2026Updated 2 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 10 months ago
- forgive me :3☆34Jan 1, 2026Updated 2 months ago
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- MuddyWater C2 framework research☆12Jun 28, 2023Updated 2 years ago
- 这里会收集一些简单的机器学习 demo。使用尽量简单的语言剖析原理,使用 Python3.6 下的 Tensorflow。☆10Apr 7, 2018Updated 7 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated last month
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- ☆12Jan 28, 2023Updated 3 years ago
- This extension provides Microsoft Macro Assembler language support for Visual Studio Code☆13Feb 24, 2021Updated 5 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆16Aug 31, 2025Updated 6 months ago