An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit
☆24Jul 20, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21551-POC
Users that are interested in CVE-2021-21551-POC are comparing it to the libraries listed below
Sorting:
- ☆25May 21, 2021Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Dec 27, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- ☆32Aug 21, 2023Updated 2 years ago
- Analysing and defeating PatchGuard universally