hakivvi / CVE-2021-40449Links
LPE exploit for a UAF in Windows (CVE-2021-40449).
☆41Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40449
Users that are interested in CVE-2021-40449 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449☆51Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆64Updated 2 years ago
- ☆62Updated 3 years ago
- ☆40Updated 2 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆44Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆78Updated 3 years ago
- Various methods of executing shellcode☆72Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆106Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆107Updated 2 months ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆127Updated 3 years ago
- ☆112Updated 3 years ago
- using the gpu to hide your payload☆62Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆124Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆108Updated last year
- Offensive RPC PoC☆88Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆103Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆54Updated 4 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆64Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆78Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago