ynwarcs / CVE-2024-38063Links
poc for CVE-2024-38063 (RCE in tcpip.sys)
☆673Updated 10 months ago
Alternatives and similar repositories for CVE-2024-38063
Users that are interested in CVE-2024-38063 are comparing it to the libraries listed below
Sorting:
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆498Updated 6 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆806Updated last week
- basic concept for the latest windows wifi driver CVE☆237Updated 8 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆122Updated 11 months ago
- PoC for CVE-2023-4911☆388Updated last year
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆295Updated last year
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆337Updated this week
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆803Updated last week
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated 2 years ago
- ☆309Updated 3 years ago
- PoC for the Untrusted Pointer Dereference in the ks.sys driver☆281Updated 7 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- ☆233Updated 9 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆673Updated 8 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆730Updated last year
- ☆1,396Updated this week
- Easily detect and restore Acropalypse vulnerable PNG and GIF files with simple Python GUI.☆136Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆316Updated 3 months ago
- LPE exploit for CVE-2023-21768☆490Updated 2 years ago
- POC exploit for CVE-2024-49138☆252Updated 5 months ago
- CVE-2023-0386在ubuntu22.04上的提权☆398Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆288Updated last year
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆347Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆548Updated last month
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆430Updated 11 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆480Updated 9 months ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆317Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 2 weeks ago