itm4n / CVEs
Random CVEs
☆30Updated last year
Alternatives and similar repositories for CVEs:
Users that are interested in CVEs are comparing it to the libraries listed below
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- ☆25Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 4 months ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆17Updated 9 months ago
- Windows internals and exploitation tricks☆92Updated 2 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆81Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- ☆43Updated last year
- ☆79Updated 10 months ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆68Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 9 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- ☆39Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- Plantronics Desktop Hub LPE☆37Updated 9 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆51Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆49Updated 9 months ago
- Analysis of the vulnerability☆49Updated last year
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆95Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- ☆29Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆45Updated 3 weeks ago
- API Hammering with C++20☆45Updated 2 years ago