exploits-forsale / 24h2-nt-exploitView external linksLinks
Exploit targeting NT kernel in 24H2 Windows Insider Preview
☆150Apr 26, 2024Updated last year
Alternatives and similar repositories for 24h2-nt-exploit
Users that are interested in 24h2-nt-exploit are comparing it to the libraries listed below
Sorting:
- Windows KASLR bypass using prefetch side-channel☆175Apr 26, 2024Updated last year
- Proof-of-Concept for CVE-2024-26218☆55Apr 26, 2024Updated last year
- Proof-of-Concept for CVE-2024-21345☆76Apr 26, 2024Updated last year
- ☆53Mar 26, 2025Updated 10 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Mar 22, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- ☆145Mar 29, 2025Updated 10 months ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- ☆81Aug 30, 2024Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Apr 12, 2025Updated 10 months ago
- Local & remote Windows DLL Proxying☆170Jun 17, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- ☆282Jul 31, 2024Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155May 7, 2024Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217May 9, 2024Updated last year
- ☆270Aug 2, 2025Updated 6 months ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- ☆106Aug 21, 2024Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated last month
- ☆21Jan 15, 2025Updated last year
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆269Oct 31, 2024Updated last year
- POC exploit for CVE-2024-49138☆266Feb 14, 2025Updated last year
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 5 months ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆687Aug 27, 2024Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Sep 13, 2023Updated 2 years ago
- PE loader for @carrot_c4k3's GameScript Xbox One exploit☆79Jul 20, 2025Updated 6 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Aug 28, 2024Updated last year
- ☆82Apr 9, 2024Updated last year
- ☆85Mar 2, 2025Updated 11 months ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Sep 29, 2024Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆537Apr 23, 2024Updated last year