yardenshafir / CVE-2020-1034View external linksLinks
PoC demonstrating the use of cve-2020-1034 for privilege escalation
☆126Mar 16, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2020-1034
Users that are interested in CVE-2020-1034 are comparing it to the libraries listed below
Sorting:
- ☆11Oct 16, 2021Updated 4 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- POC for cve-2019-1458☆179Jan 17, 2022Updated 4 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Jun 1, 2021Updated 4 years ago
- Windows EoP Bugs☆127Jun 9, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆149Mar 2, 2023Updated 2 years ago
- A way to delete a locked file, or current running executable, on disk.☆616Nov 5, 2025Updated 3 months ago
- Windows Network File System Crash PoC☆88Jun 17, 2022Updated 3 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Oct 2, 2020Updated 5 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Aug 25, 2020Updated 5 years ago
- ☆163Sep 18, 2021Updated 4 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆213Oct 5, 2025Updated 4 months ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- ☆41Jul 9, 2020Updated 5 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- APC Internals Research Code☆167Jun 28, 2020Updated 5 years ago
- ☆200Feb 4, 2022Updated 4 years ago
- ☆51Jul 20, 2020Updated 5 years ago