jjensn / CVE-2024-36877Links
Exploit POC for CVE-2024-36877
☆47Updated last year
Alternatives and similar repositories for CVE-2024-36877
Users that are interested in CVE-2024-36877 are comparing it to the libraries listed below
Sorting:
- Report and exploit of CVE-2023-36427☆90Updated last year
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Different tools for Microsoft Hyper-V researching☆61Updated 2 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆31Updated 3 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆47Updated 2 weeks ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated last month
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 3 months ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆35Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆58Updated 2 months ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated last month
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- A simple but useful project maybe help you reverse Windows.☆39Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆73Updated 2 years ago
- dynamic binary instrumentation, analysis, and patching framework☆94Updated this week
- PyKD DLLs for x86 and x64 platforms☆17Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Example payload for CVE-2022-21894☆15Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Remove WPP calls from hexrays decompiled code☆53Updated 5 months ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆70Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆127Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 10 months ago
- Windows Minidump loader for Ghidra☆29Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Portable & Custmizable Windows Defender☆12Updated 3 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago