tandasat / CVE-2024-21305
Report and exploit of CVE-2024-21305.
☆35Updated last year
Alternatives and similar repositories for CVE-2024-21305:
Users that are interested in CVE-2024-21305 are comparing it to the libraries listed below
- Report and exploit of CVE-2023-36427☆91Updated last year
- A VMWare logger using built-in backdoor.☆27Updated 5 months ago
- Windows KASLR bypass using prefetch side-channel☆78Updated 10 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Finding Truth in the Shadows☆89Updated 2 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated last year
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆33Updated last month
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆63Updated last week
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆120Updated 2 weeks ago
- This repo contains EXPs about Vulnerable Windows Driver☆37Updated 10 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆51Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆62Updated last year
- Proof-of-Concept for CVE-2024-26218☆50Updated 10 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆34Updated 2 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆70Updated 4 months ago
- Windows AppLocker Driver (appid.sys) LPE☆53Updated 7 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆82Updated 9 months ago
- ☆25Updated 4 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆39Updated 4 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 5 months ago
- ☆37Updated last month
- Generate a PDB file given the old PDB file and an address mapping☆42Updated 2 weeks ago
- A minimalistic logger for Windows Kernel Drivers.☆20Updated last year