zerozenxlabs / CVE-2023-36424View external linksLinks
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation
☆128Mar 22, 2024Updated last year
Alternatives and similar repositories for CVE-2023-36424
Users that are interested in CVE-2023-36424 are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept for CVE-2024-26218☆55Apr 26, 2024Updated last year
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆315Apr 16, 2024Updated last year
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- ☆145Mar 29, 2025Updated 10 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆150Apr 26, 2024Updated last year
- ☆149Jan 25, 2024Updated 2 years ago
- ☆82Apr 9, 2024Updated last year
- Proof-of-Concept for CVE-2024-21345☆76Apr 26, 2024Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated last month
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Oct 16, 2024Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- ☆81Aug 30, 2024Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216May 9, 2024Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- 正确解析 _HEAP_VS_***符号 ,支持在最新win11 24h2 运行,替换windbg自带的!pool命令☆17Nov 30, 2024Updated last year
- ☆180Jul 10, 2023Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆175Apr 26, 2024Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- ☆192Jul 29, 2024Updated last year
- ☆282Jul 31, 2024Updated last year
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆141Nov 3, 2025Updated 3 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆42Jun 23, 2024Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155May 7, 2024Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Apr 18, 2024Updated last year
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Jan 11, 2024Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Apr 12, 2025Updated 10 months ago
- ☆147Oct 29, 2024Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆47May 22, 2024Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Feb 2, 2026Updated 2 weeks ago
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- ☆63Mar 14, 2024Updated last year