Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!
☆157Jun 5, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-21756
Users that are interested in CVE-2025-21756 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 13, 2024Updated 2 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 7 months ago
- PoC for CVE-2024-38399☆25Sep 25, 2025Updated 6 months ago
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆41Apr 23, 2025Updated 11 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆216Mar 29, 2024Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 4 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- Exploitation of CVE-2025-29969☆63Feb 20, 2026Updated last month
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆72Apr 25, 2025Updated 11 months ago
- ☆17Jun 11, 2022Updated 3 years ago
- Linux kernel privilege escalation techniques☆154Aug 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- ☆12Aug 22, 2022Updated 3 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆547Apr 23, 2024Updated last year
- a new class of file structure attacks☆60Nov 19, 2022Updated 3 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 4 years ago
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆286Jan 5, 2026Updated 3 months ago
- Pre-Auth Exploit for CVE-2024-40711☆55Sep 15, 2024Updated last year
- ☆128Nov 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆505Sep 30, 2024Updated last year
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆207Apr 3, 2022Updated 4 years ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,441Apr 17, 2024Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆120Jan 9, 2023Updated 3 years ago
- ☆21Apr 6, 2025Updated last year
- ☆30Nov 25, 2025Updated 4 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆102Mar 29, 2024Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 6 months ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- CVE-2022-2602☆86Dec 22, 2022Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year