theabysslabs / CVE-2022-21881
POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2022-21881
Users that are interested in CVE-2022-21881 are comparing it to the libraries listed below
Sorting:
- LPE of CVE-2024-26230☆23Updated 8 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆25Updated 11 months ago
- ☆20Updated 4 months ago
- some sploits☆17Updated 7 months ago
- A PoC tool for exploiting leaked process and thread handles☆31Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago
- Adobe Reader DC Information Leak Exploit☆21Updated 2 years ago
- Analysis of the vulnerability☆51Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago
- poc code for CVE-2024-38080☆30Updated 8 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆55Updated 2 years ago
- ☆59Updated last year
- ☆12Updated 7 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆34Updated last year
- ☆26Updated 3 years ago
- ☆40Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- ☆54Updated 2 years ago
- ☆39Updated last year
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- Vulnerability analysis and proof of concepts☆34Updated 2 years ago
- ☆12Updated 2 years ago
- ☆30Updated last year