Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-1732

Description

Windows Win32k Elevation of Privilege Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html

- http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/20142995/sectool

- https://github.com/3th1c4l-t0n1/awesome-csirt

- https://github.com/4dp/CVE-2021-1732

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ASR511-OO7/windows-kernel-exploits

- https://github.com/Al1ex/WindowsElevation

- https://github.com/ArrestX/--POC

- https://github.com/Ascotbe/Kernelhub

- https://github.com/B0nfee/CVE-2022-21882

- https://github.com/BeneficialCode/CVE-2021-1732

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Challengers-win/Sec-Interview-ai

- https://github.com/ClassBluer/Exploit_Tools

- https://github.com/Cruxer8Mech/Idk

- https://github.com/CyberMonitor/somethingweneed

- https://github.com/David-Honisch/CVE-2022-21882

- https://github.com/EdgeSecurityTeam/Vulnerability

- https://github.com/ExploitCN/CVE-2021-1732-EXP-

- https://github.com/GhostTroops/TOP

- https://github.com/JERRY123S/all-poc

- https://github.com/Jkrasher/WindowsThreatResearch_JKrasher

- https://github.com/KaLendsi/CVE-2021-1732-Exploit

- https://github.com/KaLendsi/CVE-2022-21882

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/LegendSaber/exp_x64

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Pai-Po/CVE-2021-1732

- https://github.com/ReJimp/Kernel_Exploit

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SYRTI/POC_to_review

- https://github.com/Sausageinforest/CVE-2021-1732

- https://github.com/SecWiki/windows-kernel-exploits

- https://github.com/SexyBeast233/SecBooks

- https://github.com/SofianeHamlaoui/Conti-Clear

- https://github.com/Spacial/awesome-csirt

- https://github.com/Threekiii/Awesome-POC

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/YOunGWebER/cve_2021_1732

- https://github.com/YangSirrr/YangsirStudyPlan

- https://github.com/albinjoshy03/windows-kernel-exploits

- https://github.com/alian87/windows-kernel-exploits

- https://github.com/asepsaepdin/CVE-2021-1732

- https://github.com/asr511/windows-kernel-exploits

- https://github.com/bhassani/Recent-CVE

- https://github.com/brimstone/stars

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/demilson/Windows

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/dishfwk/CVE-2022-21882

- https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732

- https://github.com/fei9747/WindowsElevation

- https://github.com/fenalik/CVE-2021-1732

- https://github.com/fenasal/CVE-2021-1732

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/hugefiver/mystars

- https://github.com/huike007/penetration_poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/iGen1us/Windows-Kernal-CVE

- https://github.com/jbmihoub/all-poc

- https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732

- https://github.com/joydo/CVE-Writeups

- https://github.com/k-k-k-k-k/CVE-2021-1732

- https://github.com/k0imet/CVE-POCs

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/linuxdy/CVE-2021-1732_exp

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/ltfafei/my_POC

- https://github.com/lyshark/Windows-exploits

- https://github.com/manas3c/CVE-POC

- https://github.com/mishmashclone/SecWiki-windows-kernel-exploits

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oneoy/CVE-2021-1732-Exploit

- https://github.com/paramint/windows-kernel-exploits

- https://github.com/pawan-shivarkar/pawan-shivarkar

- https://github.com/r1l4-i3pur1l4/CVE-2021-1732

- https://github.com/r1l4-i3pur1l4/CVE-2022-21882

- https://github.com/r2bet/CVE-2021-1732

- https://github.com/ratw/CVE-2021-1732

- https://github.com/reph0r/Poc-Exp-Tools

- https://github.com/reph0r/Shooting-Range

- https://github.com/reph0r/poc-exp

- https://github.com/reph0r/poc-exp-tools

- https://github.com/salutdamour/Kernel_Exploit

- https://github.com/shanshanerxi/Red-blue-confrontation

- https://github.com/soosmile/POC

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/trhacknon/Pocingit

- https://github.com/tzwlhack/Vulnerability

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoforget/CVE-POC

- https://github.com/win32kdie/Kernel_Exploit

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yangshifan-git/CVE-2021-1732

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yisan1/hh

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve