kkent030315 / CVE-2022-42046
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
☆163Updated 2 years ago
Alternatives and similar repositories for CVE-2022-42046:
Users that are interested in CVE-2022-42046 are comparing it to the libraries listed below
- Exploitation of process killer drivers☆194Updated last year
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆234Updated last year
- It's pointy and it hurts!☆123Updated 2 years ago
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆106Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆131Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- Exploitation of echo_driver.sys☆169Updated last year
- miscellaneous scripts and programs☆227Updated 2 years ago
- WTSRM☆206Updated 2 years ago
- ☆132Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆92Updated last year
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆167Updated last year
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆184Updated 7 months ago
- Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs☆289Updated 2 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆69Updated 2 years ago
- Detect strange memory regions and DLLs☆174Updated 2 years ago
- ☆160Updated last year
- ☆228Updated 2 years ago
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆172Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆132Updated 2 years ago
- EDRSandblast-GodFault☆243Updated last year
- The code is a pingback to the Dark Vortex blog:☆169Updated last year
- ☆134Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆135Updated last year