3 Forks
10 Stars
10 Watchers

CVE-2021-27965

stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system

How to download and setup CVE-2021-27965

Open terminal and run command
git clone https://github.com/mathisvickie/CVE-2021-27965.git
git clone is used to create a copy or clone of CVE-2021-27965 repositories. You pass git clone a repository URL.
it supports a few different network protocols and corresponding URL formats.

Also you may download zip file with CVE-2021-27965 https://github.com/mathisvickie/CVE-2021-27965/archive/master.zip

Or simply clone CVE-2021-27965 with SSH
[email protected]:mathisvickie/CVE-2021-27965.git

If you have some problems with CVE-2021-27965

You may open issue on CVE-2021-27965 support forum (system) here: https://github.com/mathisvickie/CVE-2021-27965/issues

Similar to CVE-2021-27965 repositories

Here you may see CVE-2021-27965 alternatives and analogs

 raspberry-pi-os    gvisor    reactos    spectre-meltdown-checker    Awesome-UNIX    windows-kernel-exploits    linux-kernel-exploits    pmbootstrap    procfs    PPLKiller    build-linux    cilium    rt-thread    The_Holy_Book_of_X86    winfsp    simplefs    build    toaruos    linux-insides-zh    syzkaller    blog_os    gophernotes    tock    u-root    kernelpop    SpecuCheck    xos    ksm    sparkmagic    PowerNex