Exploit targeting NT kernel in 24H2 Windows Insider Preview
☆152Apr 26, 2024Updated last year
Alternatives and similar repositories for 24h2-nt-exploit
Users that are interested in 24h2-nt-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows KASLR bypass using prefetch side-channel☆178Apr 26, 2024Updated last year
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated last year
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- ☆54Mar 26, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- ☆22Jan 15, 2025Updated last year
- ☆83Aug 30, 2024Updated last year
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- ☆146Mar 29, 2025Updated 11 months ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆231Apr 12, 2025Updated 11 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆154Oct 12, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- ☆87Mar 2, 2025Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆165Aug 23, 2024Updated last year
- Repo with different exploits & PoCs☆67May 16, 2025Updated 10 months ago
- ☆274Aug 2, 2025Updated 7 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 2 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆215May 9, 2024Updated last year
- ☆288Jul 31, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆13Jun 26, 2021Updated 4 years ago
- ☆30Feb 13, 2026Updated last month
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154May 7, 2024Updated last year
- a tool used to analyze and monitor in named pipes☆194Oct 27, 2024Updated last year
- ☆38Apr 5, 2024Updated last year
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Sep 29, 2024Updated last year
- POC exploit for CVE-2024-49138☆268Feb 14, 2025Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Oct 16, 2024Updated last year
- Unofficial Common Log File System (CLFS) Documentation☆189Oct 5, 2021Updated 4 years ago