jjensn / CVE-2024-36877View external linksLinks
Exploit POC for CVE-2024-36877
☆48Aug 14, 2024Updated last year
Alternatives and similar repositories for CVE-2024-36877
Users that are interested in CVE-2024-36877 are comparing it to the libraries listed below
Sorting:
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆253Oct 26, 2024Updated last year
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆23Jun 16, 2024Updated last year
- ☆29Mar 9, 2024Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Dec 21, 2022Updated 3 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- ☆192Jul 29, 2024Updated last year
- Disk based DMA for ATA and SCSI☆42Sep 22, 2023Updated 2 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆72Sep 8, 2025Updated 5 months ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆53Dec 30, 2025Updated last month
- partially disable patchguard up to win11 21H2☆19Jun 3, 2024Updated last year
- ☆39Mar 23, 2023Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆220Jul 17, 2024Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- Tool to dump EFI runtime drivers.☆39Feb 23, 2024Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Oct 19, 2024Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆44Sep 3, 2023Updated 2 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆22Feb 19, 2023Updated 2 years ago
- anti-ransomware file-system filter☆69Sep 3, 2024Updated last year
- ☆125Sep 5, 2024Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆118Oct 15, 2024Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated last month
- Bypassing kernel patch protection runtime☆21Feb 19, 2023Updated 2 years ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Mar 22, 2024Updated last year
- ☆28Dec 20, 2025Updated last month
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 4 months ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 5 months ago
- Obfuscate calls to imports by patching in stubs☆72Aug 4, 2021Updated 4 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆79Aug 3, 2025Updated 6 months ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- My Personal Kernel-Mode Process dumper☆13Feb 18, 2024Updated last year
- A simple process query/manipulation tool using driver hooked system call. (2019)☆11Aug 30, 2021Updated 4 years ago