hakivvi / CVE-2021-40449Links
LPE exploit for a UAF in Windows (CVE-2021-40449).
☆43Updated 4 years ago
Alternatives and similar repositories for CVE-2021-40449
Users that are interested in CVE-2021-40449 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449☆53Updated 4 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆56Updated 4 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆80Updated 4 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆111Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- ☆58Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 5 years ago
- ☆70Updated 11 months ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Updated 4 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Various methods of executing shellcode☆73Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Windows API Hashes used in the malwares☆41Updated 10 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 5 years ago
- ☆62Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆90Updated 2 years ago
- Random CVEs☆34Updated 8 months ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆139Updated 2 years ago
- ☆39Updated 2 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Updated 5 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Updated 4 years ago
- A Poc on blocking Procmon from monitoring network events☆111Updated 5 months ago