[ { "id": 207602452, "name": "CVE-2019-16098", "full_name": "Barakat\/CVE-2019-16098", "owner": { "login": "Barakat", "id": 11032985, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11032985?v=4", "html_url": "https:\/\/github.com\/Barakat", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Barakat\/CVE-2019-16098", "description": "Local privilege escalation PoC exploit for CVE-2019-16098", "fork": false, "created_at": "2019-09-10T15:57:36Z", "updated_at": "2025-01-12T16:16:06Z", "pushed_at": "2019-09-13T20:05:43Z", "stargazers_count": 193, "watchers_count": 193, "has_discussions": false, "forks_count": 61, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 61, "watchers": 193, "score": 0, "subscribers_count": 5 }, { "id": 686146566, "name": "CVE-2019-16098", "full_name": "0xDivyanshu-new\/CVE-2019-16098", "owner": { "login": "0xDivyanshu-new", "id": 135882723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135882723?v=4", "html_url": "https:\/\/github.com\/0xDivyanshu-new", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xDivyanshu-new\/CVE-2019-16098", "description": null, "fork": false, "created_at": "2023-09-01T21:35:40Z", "updated_at": "2024-12-22T22:46:57Z", "pushed_at": "2023-09-02T10:41:51Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 838448093, "name": "NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE", "full_name": "Offensive-Panda\/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE", "owner": { "login": "Offensive-Panda", "id": 76246439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76246439?v=4", "html_url": "https:\/\/github.com\/Offensive-Panda", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Offensive-Panda\/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE", "description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets", "fork": false, "created_at": "2024-08-05T16:55:40Z", "updated_at": "2024-12-12T06:07:39Z", "pushed_at": "2024-08-05T18:31:16Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 15, "score": 0, "subscribers_count": 1 } ]