mzakocs / CVE-2021-21551-POCView external linksLinks
An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit
☆24Jul 20, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21551-POC
Users that are interested in CVE-2021-21551-POC are comparing it to the libraries listed below
Sorting:
- ☆25May 21, 2021Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Dec 27, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- ☆32Aug 21, 2023Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Force a file delete using a windows kernel driver☆72Jul 29, 2022Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- An example of Windows NT Native API application and kernel driver☆22Feb 10, 2020Updated 6 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- CPU-Z Exploit Proof of Concept☆32Feb 17, 2019Updated 7 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Simple demo of displaying a bitmap image in UEFI environment.☆15Sep 4, 2020Updated 5 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆11Aug 30, 2021Updated 4 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆177Dec 5, 2022Updated 3 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- ☆12Oct 20, 2016Updated 9 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Windows 微信 Key读取工具 C++版☆12May 22, 2023Updated 2 years ago
- Turing-complete 64-bit virtual machine written in C++ and C#☆14Nov 30, 2024Updated last year
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆23May 17, 2022Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- Escape From Tarkov ESP texture and Grass/Visor Remover☆10Jan 27, 2021Updated 5 years ago
- Extended library for using direct system calls on windows☆17Feb 6, 2022Updated 4 years ago
- Disable threat tracing from the kernel..☆13Apr 8, 2022Updated 3 years ago
- A cmake build system for easily managing and compiling edk2 packages☆16May 20, 2023Updated 2 years ago