freeide / CVE-2021-31955-POCLinks
☆13Updated 4 years ago
Alternatives and similar repositories for CVE-2021-31955-POC
Users that are interested in CVE-2021-31955-POC are comparing it to the libraries listed below
Sorting:
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆90Updated 4 years ago
- Random CVEs☆33Updated 4 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 5 years ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- LPE of CVE-2024-26230☆24Updated last year
- ☆72Updated last year
- ☆12Updated 5 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- Vulnerability analysis and proof of concepts☆37Updated 2 years ago
- Example for PagedOut!☆25Updated 5 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- ☆31Updated 5 years ago
- ☆24Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- poc code for CVE-2024-38080☆29Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Google Chrome Use After Free☆59Updated 3 years ago
- A collection of various exploits☆29Updated last year
- Analysis of the vulnerability☆51Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 11 months ago
- ☆48Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- ☆21Updated 5 years ago