CVE-2021-21551
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
How to download and setup CVE-2021-21551
Open terminal and run command
git clone https://github.com/mathisvickie/CVE-2021-21551.git
git clone is used to create a copy or clone of CVE-2021-21551 repositories.
You pass git clone a repository URL. it supports a few different network protocols and corresponding URL formats.
Also you may download zip file with CVE-2021-21551 https://github.com/mathisvickie/CVE-2021-21551/archive/master.zip
Or simply clone CVE-2021-21551 with SSH
[email protected]:mathisvickie/CVE-2021-21551.git
If you have some problems with CVE-2021-21551
You may open issue on CVE-2021-21551 support forum (system) here: https://github.com/mathisvickie/CVE-2021-21551/issuesSimilar to CVE-2021-21551 repositories
Here you may see CVE-2021-21551 alternatives and analogs
raspberry-pi-os gvisor reactos spectre-meltdown-checker Awesome-UNIX windows-kernel-exploits linux-kernel-exploits pmbootstrap procfs PPLKiller build-linux cilium rt-thread The_Holy_Book_of_X86 winfsp simplefs build toaruos linux-insides-zh syzkaller blog_os gophernotes tock u-root kernelpop SpecuCheck xos ksm sparkmagic PowerNex