james0x40 / CVE-2020-0624
win32k use-after-free poc
☆70Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-0624
- Win32k Exploit by Grant Willcox☆88Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- ☆147Updated 4 years ago
- Windows EoP Bugs☆125Updated 4 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- POC and exploitation of vulnerabilities☆90Updated 2 years ago
- ☆49Updated 5 years ago
- ☆62Updated 7 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- cve-2018-8453 exp☆120Updated 4 years ago
- ☆44Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆120Updated 4 years ago
- POC for CVE-2018-0824☆85Updated 2 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆66Updated 4 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆58Updated 5 years ago
- ☆33Updated 4 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆99Updated 5 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation