Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow
[4.0K] /data/pocs/8c4353345ae6c7d0b2dfbb04683d460421199f94
├── [4.0K] exploits
│ ├── [ 15K] CVE-2020-17087.cpp
│ ├── [ 16K] CVE-2020-17087.md
│ ├── [4.6K] readme.md
│ ├── [ 11K] vuln_driver_al20c.cpp
│ └── [ 12K] vuln_driver_all0c.cpp
├── [4.0K] images
│ ├── [ 34K] arbitrary_read.svg
│ ├── [ 32K] buffered.svg
│ ├── [ 30K] corrupted.svg
│ ├── [778K] cve-poc.gif
│ ├── [109K] ex_memory_disclosure_and_read.svg
│ ├── [ 59K] ex_memory_disclosure_old.svg
│ ├── [ 78K] ex_memory_disclosure.svg
│ ├── [ 32K] linkedlist_old.svg
│ ├── [ 43K] linkedlist.svg
│ ├── [ 35K] memory_disclosure.svg
│ ├── [ 28K] overflow_initial_state.svg
│ ├── [ 39K] overflow_state2.svg
│ ├── [ 42K] overflow_state3.svg
│ ├── [ 21K] security_context.png
│ └── [ 35K] unbuffered.svg
├── [ 37K] readme.md
└── [4.0K] vulnerable_driver
├── [4.1K] Overfl0w.cpp
├── [2.1K] Overfl0w.inf
├── [ 10K] Overfl0w.sys
└── [ 87] readme.txt
3 directories, 25 files