Windows LPE exploit for CVE-2022-37969
☆135Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-37969
Users that are interested in CVE-2022-37969 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆180Jul 10, 2023Updated 2 years ago
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Unofficial Common Log File System (CLFS) Documentation☆189Oct 5, 2021Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆252Jul 5, 2022Updated 3 years ago
- ☆125Sep 5, 2024Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- LPE exploit for CVE-2023-21768☆504Jul 10, 2023Updated 2 years ago
- Library and tools to access the Common Log File System (CLFS)☆26Dec 4, 2025Updated 4 months ago
- ☆323Jan 13, 2023Updated 3 years ago
- Admin to Kernel code execution using the KSecDD driver☆263Apr 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- A basic emulation of an "RPC Backdoor"☆241Aug 25, 2022Updated 3 years ago
- Remove WPP calls from hexrays decompiled code☆53Jan 31, 2026Updated 2 months ago
- CVE-2024-30090 - LPE PoC☆107Oct 17, 2024Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆15Jul 11, 2023Updated 2 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆176Dec 5, 2022Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆191Jun 30, 2023Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆352Mar 17, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆60Feb 10, 2022Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆220Dec 24, 2025Updated 3 months ago
- Bypassing PatchGuard on modern x64 systems☆264Apr 9, 2023Updated 3 years ago
- ☆239Aug 23, 2023Updated 2 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- Exploring RPC interfaces on Windows☆349Jan 30, 2024Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The code is a pingback to the Dark Vortex blog:☆186Jan 26, 2023Updated 3 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆111Oct 26, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- ☆19Nov 7, 2024Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago