CVE-2018-8440 standalone exploit
☆80Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2018-8440
Users that are interested in CVE-2018-8440 are comparing it to the libraries listed below
Sorting:
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆101Nov 10, 2021Updated 4 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 6 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆88Apr 17, 2021Updated 4 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- cross platform asynchronous networking library☆10Apr 1, 2020Updated 5 years ago
- Windows Process Lockdown Tool using Job Objects☆70Nov 10, 2013Updated 12 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- ☆14Feb 14, 2018Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago