kkent030315 / CVE-2022-42046
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
☆162Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-42046
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆165Updated last year
- A PoC implementation for dynamically masking call stacks with timers.☆250Updated last year
- Exploitation of process killer drivers☆188Updated last year
- Detect strange memory regions and DLLs☆170Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆130Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆210Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆120Updated last year
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆165Updated last year
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆231Updated last year
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆105Updated last year
- Exploitation of echo_driver.sys☆167Updated last year
- ☆152Updated last year
- ☆210Updated last year
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- WTSRM☆199Updated 2 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆169Updated last year
- PE obfuscator with Evasion in mind☆210Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆67Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆98Updated 2 years ago
- EDRSandblast-GodFault☆240Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆144Updated last year
- miscellaneous scripts and programs☆215Updated last year
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆161Updated last year
- ETW based POC to identify direct and indirect syscalls☆173Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆91Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year