mathisvickie / CVE-2021-21551View external linksLinks
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
☆58Nov 16, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21551
Users that are interested in CVE-2021-21551 are comparing it to the libraries listed below
Sorting:
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- CVE-2018-19320 LPE Exploit☆10Jun 19, 2023Updated 2 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- APC Internals Research Code☆167Jun 28, 2020Updated 5 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆177Dec 5, 2022Updated 3 years ago
- Exploit MsIo vulnerable driver☆126Aug 12, 2021Updated 4 years ago
- ☆86Jan 12, 2022Updated 4 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆25May 21, 2021Updated 4 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- base for testing☆186Sep 28, 2024Updated last year
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Mar 26, 2024Updated last year
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- Bypassing PatchGuard on modern x64 systems☆265Apr 9, 2023Updated 2 years ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- ☆11Oct 16, 2021Updated 4 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Dec 21, 2022Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Exploitable drivers, you know what I mean☆153Nov 16, 2025Updated 3 months ago
- ☆38Nov 30, 2022Updated 3 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Oct 12, 2021Updated 4 years ago
- It's pointy and it hurts!☆127Oct 18, 2022Updated 3 years ago