mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-28 15:15:32 +01:00
95 lines
No EOL
3.9 KiB
JSON
95 lines
No EOL
3.9 KiB
JSON
[
|
||
{
|
||
"id": 1096236382,
|
||
"name": "CVE-2025-62215-exploit-poc",
|
||
"full_name": "dexterm300\/CVE-2025-62215-exploit-poc",
|
||
"owner": {
|
||
"login": "dexterm300",
|
||
"id": 218176535,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/218176535?v=4",
|
||
"html_url": "https:\/\/github.com\/dexterm300",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dexterm300\/CVE-2025-62215-exploit-poc",
|
||
"description": "CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.",
|
||
"fork": false,
|
||
"created_at": "2025-11-14T06:04:02Z",
|
||
"updated_at": "2025-12-02T01:46:59Z",
|
||
"pushed_at": "2025-11-14T06:07:19Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"has_discussions": false,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 10,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1098752716,
|
||
"name": "Kernel-Chaos-Weaponizing-CVE-2025-62215-for-SYSTEM-Privilege-Escalation",
|
||
"full_name": "mrk336\/Kernel-Chaos-Weaponizing-CVE-2025-62215-for-SYSTEM-Privilege-Escalation",
|
||
"owner": {
|
||
"login": "mrk336",
|
||
"id": 225503019,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/225503019?v=4",
|
||
"html_url": "https:\/\/github.com\/mrk336",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mrk336\/Kernel-Chaos-Weaponizing-CVE-2025-62215-for-SYSTEM-Privilege-Escalation",
|
||
"description": "Hands‑on analysis of CVE‑2025‑62215, a Windows Kernel race condition exploited in the wild. Demonstrates privilege escalation to SYSTEM, detection scripts, and patch validation strategies for enterprise defenders and red teamers.",
|
||
"fork": false,
|
||
"created_at": "2025-11-18T05:13:34Z",
|
||
"updated_at": "2025-11-19T16:07:11Z",
|
||
"pushed_at": "2025-11-18T05:29:32Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1099143510,
|
||
"name": "CVE-2025-62215_Windows_Kernel_PE",
|
||
"full_name": "abrewer251\/CVE-2025-62215_Windows_Kernel_PE",
|
||
"owner": {
|
||
"login": "abrewer251",
|
||
"id": 150287770,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150287770?v=4",
|
||
"html_url": "https:\/\/github.com\/abrewer251",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/abrewer251\/CVE-2025-62215_Windows_Kernel_PE",
|
||
"description": "This PoC demonstrates a race condition in the Windows kernel leading to a double-free vulnerability, allowing local privilege escalation to SYSTEM. The exploit uses multithreaded handle manipulation and heap spraying to trigger the flaw under controlled conditions.",
|
||
"fork": false,
|
||
"created_at": "2025-11-18T16:12:44Z",
|
||
"updated_at": "2025-11-18T16:34:09Z",
|
||
"pushed_at": "2025-11-18T16:34:05Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |