fortra / CVE-2022-37969View external linksLinks
Windows LPE exploit for CVE-2022-37969
☆136Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-37969
Users that are interested in CVE-2022-37969 are comparing it to the libraries listed below
Sorting:
- ☆180Jul 10, 2023Updated 2 years ago
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Jul 5, 2022Updated 3 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- ☆125Sep 5, 2024Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- Unofficial Common Log File System (CLFS) Documentation☆186Oct 5, 2021Updated 4 years ago
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Library and tools to access the Common Log File System (CLFS)☆25Dec 4, 2025Updated 2 months ago
- Exploring RPC interfaces on Windows☆344Jan 30, 2024Updated 2 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆177Dec 5, 2022Updated 3 years ago
- Dump the memory of any PPL with a Userland exploit chain☆352Mar 17, 2023Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- ☆161Jun 18, 2023Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- The code is a pingback to the Dark Vortex blog:☆187Jan 26, 2023Updated 3 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- ☆62Feb 10, 2022Updated 4 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- Bypassing PatchGuard on modern x64 systems☆265Apr 9, 2023Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated 2 weeks ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆718Jul 19, 2023Updated 2 years ago
- ☆282Jul 31, 2024Updated last year
- Exploitable drivers, you know what I mean☆153Nov 16, 2025Updated 3 months ago