ysanatomic / io_uring_LPE-CVE-2024-0582Links
LPE exploit for CVE-2024-0582 (io_uring)
☆100Updated last year
Alternatives and similar repositories for io_uring_LPE-CVE-2024-0582
Users that are interested in io_uring_LPE-CVE-2024-0582 are comparing it to the libraries listed below
Sorting:
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- ☆80Updated 9 months ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- ☆63Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Updated 9 months ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆139Updated 2 weeks ago
- ☆86Updated 2 years ago
- CVE-2022-2602☆87Updated 2 years ago
- ☆35Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- Shielder's public proof of concepts collection☆31Updated 9 months ago
- ☆63Updated last year
- ☆131Updated last year
- ☆71Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 6 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 11 months ago
- ☆125Updated 7 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 6 months ago
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- VM Escape for Parallels Desktop <18.1.1☆170Updated last year
- Repo with different exploits & PoCs☆64Updated last month
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆162Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆90Updated 4 months ago
- ☆215Updated last year
- ☆34Updated last year
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆24Updated 2 years ago
- ☆72Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆56Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆95Updated last year