piotrflorczyk / cve-2019-1458_POC
POC for cve-2019-1458
☆172Updated 3 years ago
Alternatives and similar repositories for cve-2019-1458_POC:
Users that are interested in cve-2019-1458_POC are comparing it to the libraries listed below
- ☆232Updated 7 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- Windows EoP Bugs☆127Updated 4 years ago
- Win32k Exploit by Grant Willcox☆88Updated 5 years ago
- ☆147Updated 5 years ago
- ☆134Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 2 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆200Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆123Updated 4 years ago
- writeup of CVE-2020-1362☆232Updated 4 years ago
- ☆130Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆220Updated 2 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- Windows RPC Python fuzzer☆160Updated 7 years ago
- two heap address leak bugs in `usosvc` service☆93Updated 4 years ago
- ☆108Updated 4 years ago
- ☆381Updated last year
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- Process reimaging proof of concept code☆96Updated 5 years ago
- Poc for CVE-2019-1253☆155Updated 3 years ago
- ☆67Updated 2 years ago
- Idapython script to carve binary for internal RPC structures☆231Updated last year
- Tools for instrumenting Windows Defender's mpengine.dll☆294Updated 6 years ago
- Dump of win32k POCs for bugs I've found☆371Updated 3 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆129Updated 4 years ago
- ☆265Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆193Updated 5 years ago
- POC and exploitation of vulnerabilities☆90Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago