exploits-forsale / CVE-2024-21345Links
Proof-of-Concept for CVE-2024-21345
☆76Updated last year
Alternatives and similar repositories for CVE-2024-21345
Users that are interested in CVE-2024-21345 are comparing it to the libraries listed below
Sorting:
- Analysis of the vulnerability☆51Updated last year
- ☆37Updated 11 months ago
- ☆41Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ☆122Updated last year
- ☆137Updated last year
- Plantronics Desktop Hub LPE☆37Updated last year
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 3 weeks ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated 10 months ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆35Updated 2 years ago
- ☆81Updated last year
- ☆67Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆28Updated 3 weeks ago
- Repo with different exploits & PoCs☆64Updated 5 months ago
- ☆72Updated 3 months ago
- ☆37Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- some sploits☆18Updated last year
- LPE of CVE-2024-26230☆24Updated last year
- ☆36Updated 6 months ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆29Updated 9 months ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆98Updated last week
- ☆24Updated 2 years ago
- LPE exploit for CVE-2023-36802☆165Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆67Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆30Updated 2 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆24Updated last year