Windows LPE exploit for CVE-2022-37969
☆135Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-37969
Users that are interested in CVE-2022-37969 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆180Jul 10, 2023Updated 2 years ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- ☆138Jan 8, 2024Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆154Oct 12, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Unofficial Common Log File System (CLFS) Documentation☆189Oct 5, 2021Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- ☆124Sep 5, 2024Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- Library and tools to access the Common Log File System (CLFS)☆26Dec 4, 2025Updated 3 months ago
- ☆323Jan 13, 2023Updated 3 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated last month
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆362Dec 19, 2022Updated 3 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆15Jul 11, 2023Updated 2 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆176Dec 5, 2022Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆190Jun 30, 2023Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆352Mar 17, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Jul 2, 2020Updated 5 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆220Dec 24, 2025Updated 3 months ago
- Bypassing PatchGuard on modern x64 systems☆264Apr 9, 2023Updated 2 years ago
- ☆240Aug 23, 2023Updated 2 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- Exploring RPC interfaces on Windows☆347Jan 30, 2024Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The code is a pingback to the Dark Vortex blog:☆186Jan 26, 2023Updated 3 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Oct 26, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- ☆18Nov 7, 2024Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago