pqlx / CVE-2022-1015
Local privilege escalation PoC for Linux kernel CVE-2022-1015
☆198Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-1015
- Exploit for CVE-2022-27666☆203Updated 2 years ago
- ☆169Updated last year
- CVE-2022-0185☆366Updated 2 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆559Updated 2 years ago
- CVE-2022-25636☆426Updated 2 years ago
- ☆243Updated 2 years ago
- ☆296Updated last year
- ☆208Updated 7 months ago
- CVE-2022-0995 exploit☆494Updated 2 years ago
- A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.☆230Updated last year
- CVE-2023-4911 proof of concept☆163Updated last year
- CVE-2021-1965 WiFi Zero Click RCE Trigger PoC☆166Updated 2 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆231Updated 3 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆155Updated 11 months ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆218Updated 3 years ago
- ☆86Updated last year
- ☆276Updated 2 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆148Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆369Updated last year
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆361Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- ☆193Updated 2 years ago
- PHP binary bugs advisory☆178Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆145Updated 2 years ago
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆51Updated 2 years ago
- Recursive MMIO VM Escape PoC☆169Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆280Updated 2 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆109Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆188Updated 2 years ago
- ☆153Updated last year