Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35250 PoC — Microsoft Windows Kernel Mode Drivers 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Kernel Mode Drivers 安全漏洞 (CVE-2024-35250)
Description:Microsoft Windows Kernel Mode Drivers是美国微软(Microsoft)公司的Windows内核模式驱动。 Microsoft Windows Kernel Mode Drivers存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809
Description
CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC
Readme
# GiveMeKernel
This repository contains a condensed and optimized proof-of-concept (PoC) exploit for **CVE-2024-35250**. The code is based on Varwara's original release PoC.

> **Disclaimer:**  
> This PoC is for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to test. The author is not responsible for any misuse or damage caused by this code.

## Changes and Optimizations

- **Code Condensation:**  
  The code has been refactored to reduce redundancy by combining similar conditional branches and removing repetitive sections.

- **Type and Function Adjustments:**  
  - Corrected type mismatches, especially in string comparisons (e.g., switching from wide-character to ANSI strings in process enumeration).
  - Maintained core functionality with standard Windows API calls and ensured compatibility across various Windows versions.

- **Refined Process Handling:**  
  Optimized memory allocation and API calls for operations like enumerating processes, obtaining kernel module addresses, and writing to virtual memory.

## Prerequisites

- Windows version  10.0.10240 – 10.0.25398


File Snapshot

[4.0K] /data/pocs/30026fd7b8230d0dd0ede93630af962ffe4ca6ca ├── [4.0K] GiveMeKernel.cpp ├── [9.6K] Helpers.h └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.