the-deniss / Vulnerability-DisclosuresLinks
Vulnerability analysis and proof of concepts
☆37Updated 2 years ago
Alternatives and similar repositories for Vulnerability-Disclosures
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below
Sorting:
- ☆61Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Example for PagedOut!☆25Updated 6 years ago
- Random CVEs☆34Updated 8 months ago
- LPE of CVE-2024-26230☆23Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Updated 3 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆38Updated 5 months ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Updated 5 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- ☆12Updated 5 years ago
- poc code for CVE-2024-38080☆30Updated last year
- Analysis of the vulnerability☆50Updated last year
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago
- ☆40Updated 4 years ago
- Yet another Windows DLL injector.☆40Updated 4 years ago
- Proof-of-Concept for CVE-2024-26218☆55Updated last year
- ☆21Updated last year
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- ☆85Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago
- Here I store my proof of concepts☆14Updated last year
- ☆70Updated 11 months ago
- ☆31Updated 5 years ago
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- May the POC be with you☆64Updated 2 weeks ago
- Plantronics Desktop Hub LPE☆37Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 5 years ago