hakivvi / CVE-2021-40449Links
LPE exploit for a UAF in Windows (CVE-2021-40449).
☆41Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40449
Users that are interested in CVE-2021-40449 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449☆51Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- Enabled / Disable LSA Protection via BYOVD☆71Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- ☆39Updated 2 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆30Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆21Updated 5 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆56Updated 2 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Updated 2 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆54Updated 4 years ago
- ☆62Updated 3 years ago
- using the gpu to hide your payload☆59Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆58Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆109Updated last year
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆103Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆87Updated 2 years ago
- ☆11Updated 4 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆42Updated 4 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- Persistence via Shell Extensions☆62Updated last year
- ☆56Updated 3 years ago
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆17Updated 5 years ago