kkent030315 / CVE-2022-42046View external linksLinks
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
☆162Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-42046
Users that are interested in CVE-2022-42046 are comparing it to the libraries listed below
Sorting:
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆177Dec 5, 2022Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Dec 27, 2022Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆352Mar 17, 2023Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 2 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆265Apr 9, 2023Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆113Aug 29, 2022Updated 3 years ago
- Minifilter Callback Patching Proof-of-Concept☆73Oct 31, 2022Updated 3 years ago
- ☆385Jan 19, 2023Updated 3 years ago
- ☆90Jun 2, 2024Updated last year
- Recovering NTLM hashes from Credential Guard☆378Dec 26, 2022Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Nov 5, 2024Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- x86 PE Mutator☆233Dec 24, 2022Updated 3 years ago
- Signtool for expired certificates☆513Jun 10, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆154Jan 21, 2023Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆317Oct 13, 2024Updated last year
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆276Aug 25, 2023Updated 2 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆671Nov 9, 2023Updated 2 years ago
- ☆184Jul 2, 2022Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆335Feb 3, 2023Updated 3 years ago
- ☆504Aug 14, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆952Feb 2, 2026Updated 2 weeks ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 2 weeks ago
- ☆322Jan 13, 2023Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆911Jul 20, 2024Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Jul 5, 2022Updated 3 years ago
- .lib file for linking against the NT CRT☆18Mar 18, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago