piotrflorczyk / cve-2019-1458_POCLinks
POC for cve-2019-1458
☆175Updated 3 years ago
Alternatives and similar repositories for cve-2019-1458_POC
Users that are interested in cve-2019-1458_POC are comparing it to the libraries listed below
Sorting:
- Win32k Exploit by Grant Willcox☆89Updated 6 years ago
- ☆235Updated 7 years ago
- Windows EoP Bugs☆128Updated 5 years ago
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆208Updated 4 years ago
- ☆148Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 3 years ago
- ☆384Updated last year
- ☆135Updated 5 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- two heap address leak bugs in `usosvc` service☆93Updated 4 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆193Updated 5 years ago
- ☆130Updated 2 years ago
- Windows RPC Python fuzzer☆162Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆300Updated 6 years ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆228Updated 2 years ago
- Idapython script to carve binary for internal RPC structures☆234Updated last year
- Dump of win32k POCs for bugs I've found☆375Updated 3 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆129Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- ☆116Updated 4 years ago
- POC and exploitation of vulnerabilities☆91Updated 3 years ago
- win32k use-after-free poc☆72Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆222Updated 2 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆145Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆186Updated 3 years ago