ynwarcs / CVE-2024-38063
poc for CVE-2024-38063 (RCE in tcpip.sys)
☆661Updated 7 months ago
Alternatives and similar repositories for CVE-2024-38063:
Users that are interested in CVE-2024-38063 are comparing it to the libraries listed below
- a signal handler race condition in OpenSSH's server (sshd)☆476Updated 9 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆489Updated 3 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆777Updated this week
- ☆1,936Updated last year
- basic concept for the latest windows wifi driver CVE☆235Updated 5 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆292Updated last year
- ☆306Updated 2 years ago
- PoC for the Untrusted Pointer Dereference in the ks.sys driver☆278Updated 4 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆716Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,172Updated 4 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆521Updated 3 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆416Updated last year
- ☆233Updated 6 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆382Updated 8 months ago
- ☆542Updated this week
- HookChain: A new perspective for Bypassing EDR Solutions☆514Updated 3 months ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆383Updated 5 months ago
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆340Updated 9 months ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆315Updated 2 years ago
- Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.☆132Updated last year
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated last year
- POC exploit for CVE-2024-49138☆248Updated 2 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,175Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆261Updated last month
- PoC for CVE-2023-4911☆385Updated last year
- New generation of wmiexec.py☆1,070Updated 5 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆472Updated 6 months ago
- HVNC for Cobalt Strike☆1,213Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆677Updated 8 months ago